ESET Research: Threat Reports
Discover the latest activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024.
Published on 14 May 2024
•
2 min. read
ESET APT Activity Report Q4 2023–Q1 2024
Get a comprehensive overview of notable activities of selected advanced persistent threat (APT) groups documented by ESET researchers from October 2023 until the end of March 2024. These highlighted operations showcase key trends and developments in the cybersecurity landscape during this period, providing valuable insights for our customers.
In this report, you will find details on various threat actors, including China-aligned groups exploiting vulnerabilities in public-facing appliances and software, a new China-aligned APT group called CeranaKeeper, and increased activity from Iran-aligned threat groups following the attack on Israel.
North Korea-aligned groups have continued targeting aerospace and defense companies, while Russia-aligned groups focus on espionage within the European Union and attacks on Ukraine. The report also covers campaigns in the Middle East, a watering-hole attack on a news website, and the exploitation of a zero-day vulnerability in Roundcube.
Stay informed with ESET’s APT Activity Reports for the latest cybersecurity intelligence data. For more information, visit the ESET Threat Intelligence website.
Key Highlights:
- China-aligned threat actors exploiting vulnerabilities in VPNs and firewalls
- New China-aligned APT group, CeranaKeeper, identified
- Increased activity from Iran-aligned threat groups
- North Korea-aligned groups targeting aerospace and defense companies
- Russia-aligned groups focusing on espionage and attacks on Ukraine
- Other campaigns and attacks in the Middle East and Europe
Figure 1. Targeted countries and sectors
Figure 2. Attack sources
ESET APT Activity Reports provide valuable insights into the latest cybersecurity threats. For more in-depth analysis, check out ESET APT Reports PREMIUM. Stay updated on key trends and top threats by following ESET research on X.