This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

APT12 group uses G20 Summit buzz to infiltrate organisations

Share this article:

Interest in a major summit attended by the world's economic and political leaders is being manipulated to further the schemes of an accomplished cyber espionage group, researchers warn.

Security firm Rapid7 discovered an intensifying phishing campaign being carried out by APT12, the collective believed to be backed by China's People's Liberation Army, which carried out months-long breach on The New York Times earlier this year.

According to Claudio Guarnieri, a researcher at FireEye, who blogged about the campaign on Monday, a “swarm” of malicious emails themed around the 2013 G20 Summit in Russia, due to commence next Thursday, indicates that the group is still actively targeting organisations for intellectual property and other sensitive data.

This year, G20 Summit leaders are convening in St. Petersburg, Russia, for the eighth summit since G20's formation.

After analysing several reports on VirusTotal, Guarnieri found that the mounting interest in the summit appears to present itself as the perfect opportunity for hackers aiming to gain a foothold in organisations.

In the blog post, he dissected three phishing attacks where hackers distributed malware using weaponised zip files. The malware consisted of backdoor Trojans capable of logging victims' keystrokes and downloading additional, and more sophisticated, malware on compromised machines.

According to the blog post, a Canadian user reported a suspicious file to VirusTotal on 31st May, which was meant to look like a PDF detailing agenda notes for the G20 Summit. On 16th August, a user in France also reported another spurious zip file, which was designed to appear like informational materials about the forum. Also, last week, an individual in Hungary made note of a similar executable being sent to their organisation.

In some cases, malicious attachments contained in the phishing emails copied word-for-word the real materials and press releases being distributed to groups about the event.

Based on the activity, Guarnieri concluded that the adversary behind the attacks was APT12, primarily because instructions dispatched to the malware were sent from the same IP address that FireEye also linked to APT12 activity two weeks ago.

No vulnerabilities were leveraged in any of the G20-themed ruses, according to Rapid7's research.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Brit Lauri Love faces more US hacking charges

Brit Lauri Love faces more US hacking charges

Lauri Love, a 29-year-old British man from Stradishall in Suffolk, has been charged by a US court with hacking into multiple US government computers and stealing more than 100,000 employee ...

StubHub ticketing agency taken for a million pounds

StubHub ticketing agency taken for a million pounds

Police around the world have arrested seven people - thought to have been tied into an international fraud ring - that allegedly defrauded the eBay-owned StubHub online ticketing service of ...

DDoS attacks grow as first DIY kits emerge

DDoS attacks grow as first DIY kits emerge

The latest report from Akamai Technologies has revealed another increase in DDoS attacks and the resurgence of botnets to carry out server-based attacks.