back to top
14.9 C
Johannesburg
spot_imgspot_img
More
    spot_img

    Date:

    Share:

    Kaspersky Highlights Key Industries Targeted by APT groups across the Middle East, Turkiye, and Africa

    Kaspersky reveals that the Middle East, Turkiye, and Africa are a focus for 25 Advanced Persistent Threat (APT) groups tracked since early 2024. The findings show that these groups target financial services, critical infrastructure, defence, and government entities, while also extending their reach into commercial and emerging industries.

    The research shows a diverse threat landscape, with both established and emerging groups active across the region. For example, the Griffith group consistently targets the financial services industry across multiple countries, while SideWinder demonstrates a wide geographic scope and industry reach and mainly focuses on espionage. Additionally, Kaspersky experts have observed campaigns from the APT Evasive Panda and Cloud Atlas, both active in Turkiye.

    Kaspersky researchers note that initial access by the majority of APTs targeting the region is often gained through socially engineered spear-phishing campaigns. Once inside, these threat actors prioritise stealth, frequently masquerading as legitimate services or routine scheduled tasks. This approach enables them to remain undetected within networks for extended periods, in some cases months or even years, while continuing to gather intelligence or prepare for further attacks.

    “When we analyse APT activities in the region, what stands out is how quickly their methods adapt,” said Maher Yamout, Lead Security Researcher at Kaspersky. “We’re seeing attackers’ experiment with new exploits, expand into uncommon sectors, and in some cases, test the waters in countries that were previously less affected. It’s a clear reminder that no industry or organisation is off the radar for advanced attackers.”

    To help organisations protect their IT infrastructure against sophisticated targeted attacks, Kaspersky security experts recommend the following measures:

    To learn more about Kaspersky’s Threat Intelligence, click here.

    spot_img
    spot_imgspot_img

    ━ More like this

    Tired, trusted and targeted: The new face of insider cyber risk

    Most organisations link employee well-being to productivity, but overlook the direct correlation between high-pressure work environments and heightened cybersecurity risk. In an era of...

    Kaspersky warns of blackmail from alleged “hackers”, “law enforcement” and “hitmen”

    Attackers are incorporating personal details like full names and phone numbers in scam emails to appear credible and induce panic among victims. Scammers may...

    Navigating the security sprawl: Why a unified view is the cornerstone of cyber resilience

    South African organisations are facing an unprecedented wave of cybersecurity incidents. According to the CSIR, 88% of organisations have now faced at least one data...

    In2IT CIO Cybersecurity Roundtable explores why cybersecurity is a foundational pillar of the modern digital landscape

    Technology consulting services provider In2IT Technologies hosted its second annual CIO Cybersecurity Roundtable discussion last week, in partnership with the Gauteng Department of e-Government,...

    Kaspersky: DLL hijacking attacks have doubled since 2023

    Dynamic link library (DLL) hijacking is a common technique in which attackers replace a library loaded by a legitimate process with a malicious one....
    spot_imgspot_img