TAG

#apt 30

1 Articles

In the company’s recently-published report, FireEye Labs Team in Singapore uncovered a set of malware that were developed with a dedicated set of tools built by a group identified in the report as APT 30 which stands for Advanced Persistent Threat. FireEye was keen to point out that the tool that APT30 is using is constantly updated which allow them to be virtually undetected for at least a decade. This leads the security firm to believe that either APT30 maintains this alleged tool themselves or they are working closely with other developers that provides maintenance and updates for it. Based on the targets that FireEye identified, which are mostly in the Southeast Asian region, the security firm suspects that the malware is primarily being used by APT 30 in “acquiring sensitive information from a variety of targets” for political gain. Along with political targets, FireEye also uncovered that APT 30 is also spying on private companies and journalists across Southeast Asia, particular those “who do not provide favorable coverage”. Photos from Android Headlines fully capture the difference:   Unfortunately, while most key elements such as memory, processor, and others will likely be carried over, some compromises have to be made due to its form factor. Read more in our articles including "China Linked to Decade-long Spying in SEA Countries" and "The biggest changes are coming to Android Auto".

More About apt 30

Frequently Asked Questions

What is apt 30?

In the company’s recently-published report, FireEye Labs Team in Singapore uncovered a set of malware that were developed with a dedicated set of tools built by a group identified in the report as APT 30 which stands for Advanced Persistent Threat. FireEye was keen to point out that the tool that APT30 is using is constantly updated which allow them to be virtually undetected for at least a decade.

What have you covered about apt 30?

This leads the security firm to believe that either APT30 maintains this alleged tool themselves or they are working closely with other developers that provides maintenance and updates for it. Based on the targets that FireEye identified, which are mostly in the Southeast Asian region, the security firm suspects that the malware is primarily being used by APT 30 in “acquiring sensitive information from a variety of targets” for political gain. Along with political targets, FireEye also uncovered that APT 30 is also spying on private companies and journalists across Southeast Asia, particular those “who do not provide favorable coverage”.

Where can I find articles about apt 30?

Our coverage of apt 30 includes: "China Linked to Decade-long Spying in SEA Countries"; "The biggest changes are coming to Android Auto"; "Free internet 24/7 now at Pasig River stations and ferries". Each article provides unique insights and information.