Explore tweets tagged as #APT10
@inversecos
inversecos
1 year
APT Emulation Labs: NOW LIVE 🎉. Solve incidents emulating APT29, APT10 and other threat groups. $45 per month access to ALL labs:.👀 150+ hours of lab content.👀 Disk forensics + ELK logs .👀 Hints, questions and point system.👀 7 days free trial. Labs are created & designed
27
258
990
@RendTheVeil
Parsifal - Le Comte de Duckula 🦆
2 years
The History of APT10
Tweet media one
0
0
0
@shizuokagyousei
山崎行政書士事務所
14 days
#企業公式相互フォロー. TBS系列『#報道特集』CM提供中。. 🔐「攻撃は止めた。でも“なぜ守れたか”を証明できない。」. BlackTech(中国系APT)が業務用ルータを改ざんし、.国内の製造・通信・エネルギー企業の内部ネットワークに侵入。.MirrorFace(APT10系)は官公庁や報道機関へ、
0
0
3
@_JohnHammond
John Hammond
2 months
Playing with Windows Sandbox, following the recent reports of APT10 subgroup "MirrorFace" using it intentionally to execute malware without the watchful eye of antivirus or EDR -- because it's in a VM 😜 Shared folders still give access to the filesystem:
Tweet media one
5
21
111
@t_nihonmatsu
二本松哲也
24 days
日鉄ソリューションズの社内ネットワークが、ゼロデイ脆弱性を悪用した不正アクセスを受け、個人情報が外部に漏洩した可能性。3月7日の検知以前に侵入済みの可能性があります。.最近は国家支援系APTが金銭・情報戦・産業スパイを目的にゼロデイを多用(例:APT41、APT10)しており警戒が必要です。
Tweet media one
1
14
89
@shizuokagyousei
山崎行政書士事務所
16 days
#企業公式相互フォロー. 「SharePointは止めた。でも“なぜ止めたか”を証明できなかった。」.── 攻撃に勝っても、構成証明で崩れる日本企業の現場.🇨🇳【別事例再現】. 2025年2月、某大手設計事務所にて.中国系APT「MirrorFace(別名:APT10)」が水面下で侵入。.対象は、Microsoft
Tweet media one
0
0
6
@cocomelonckz
zhassulan zhussupov
1 month
1
21
74
@vxunderground
vx-underground
4 months
The National Police Agency (NPA) of Japan recent documentation of state-sponsored Threat Actors from China is interesting. A group they believe to be a subset of APT10, abuses WSB (Windows Sandbox) by creating a .wsb configuration file and using it to spin up an instance of the
Tweet media one
Tweet media two
12
242
2K
@grok
Grok
21 days
@JLdBFM ¡Recuperado y listo! Sobre los hackers chinos: APT1 (Unidad 61398 del EPL, espionaje); APT10 (MenuPass, ciberataques a proveedores); APT41 (Winnti, espionaje y crimen); Naikon (APT30, objetivos en Asia); Mustang Panda (ataques a ONGs). ¿Malvado yo? Nah, solo distraído. En la.
1
0
0
@VPNRanks
VPNRanks
7 months
⚠️ Cyberattack Alert! MirrorFace, a subgroup of APT10, targets Japan with advanced tactics like sandbox evasion and ANEL malware. Critical industries at risk! . Read more: #cyberthreats #mirrorface #apt10 #cybersecurity #TechNews #DigitalDefense #VPNRanks
0
0
0
@grok
Grok
1 month
@apt10_av @korug_haber "Kene" Türkçe'de hem gerçek hem mecazi anlamda kullanılır. Gerçek anlamda kene, kan emerek beslenen ve hastalık taşıyabilen küçük bir örümcek türüdür (örneğin, Lyme hastalığı). Mecazi olarak ise, birinin başkalarına bağımlı, sömürücü ya da asalak gibi algılanmasını ifade eden bir.
0
0
0
@seijiyougobot_s
政治用語bot(そふと)
2 months
「APT10」.中国政府・中国企業に役に立つ情報ばかり盗んでいるとあるハッカー集団の通称。.中国政府に繫がってるんじゃね?と言われている。.
0
0
0
@sudo_nikkei
須藤龍也(日本経済新聞) / Tatsuya Sudo (Nikkei)
2 months
Purple Typhoon, POTASSIUM, STONE PANDA, GOLEM, Evilgrab, AEON, LIVESAFE, ChChes, APT10, Haymaker, Webmonder, Foxtrot, Foxmail, MenuPass, Red Apollo.これ、同じハッカー集団の名称です。.米マイクロソフトなどが名前を統一しようと提案しています。.
1
4
11
@Guardia_School
Guardia Cybersecurity School
1 year
Un virus que personne n'a vu passer ❌. L'affaire remonte à fin 2018, lorsqu'Airbus est victime d'une cyberattaque. Les données du nouvel Airbus A320 sont volées par ce qui ressemble au groupe de hackers chinois APT10, alors recherché par le FBI. 🎬 @servicePresseF5
0
0
5
@grok
Grok
16 days
@apt10_av @m_cemilkilic Abdurrahman Uzun'un tahmini net varlığı, YouTube ve medya faaliyetlerinden 1-1.4 milyon USD civarında. Siyasi olarak AKP yandaşı, tartışmalı açıklamalarıyla tanınıyor – Kemalizm karşıtlığı gibi. Gerçek "ederi" ise fikir ayrılıklarına göre değişir.
0
0
0
@inversecos
inversecos
1 year
Here are some of the incidents waiting to be solved. 1⃣ APT10 Cloud Hopper (VirusVipers).Contributors: @ZephrFish @svch0st .Supply chain attack where APT10 hacked an MSSP to laterally move into a client network for exfil. 2⃣ APT29 Hacks the Cloud (AssassinKitty).Contributors:
Tweet media one
1
10
91
@ESET_de
ESET DACH
5 months
Mit einer #Phishing-Mail zur EXPO 2025 lockte die Hackergruppe #MirrorFace europäische Diplomaten in eine Falle. Ein Remote Access Trojaner (RAT) & eine Microsoft Sandbox halfen beim Datendiebstahl. #ESET-Analyse deutet auf Verbindung zu #APT10 hin. ➡️
0
0
0
@mervinpearce
Mervin Pearce (CISSP-ISSAP) 🇵🇹
1 year
Unveiling the global cyber espionage landscape: Discover the notorious APT groups that pose significant threats across the world. From APT1's widespread assaults on industries to APT10's 'Cloud Hopper' campaign, the tactics of state-sponsored agents like APT40 and Static Kitten
Tweet media one
0
2
4
@DeepFlowcc
DeepFlow
4 months
China-linked MirrorFace (APT10) targets Europe with ANEL backdoor, shifting from Japan. Uses custom AsyncRAT & wipes logs—tight OPSEC. Stay vigilant! #CyberEspionage #APT10 #Malware #InfoSec.
0
0
1