Blog | G5 Cyber Security

MontysThree APT Takes Unusual Aim at Industrial Targets

A series of highly targeted attacks by an APT group called MontysThree against industrial targets has been uncovered, with evidence that the campaign dates back to 2018. The group uses a variety of techniques to evade detection, including using public cloud services for command-and-control (C2) communications, and hiding its main malicious espionage module using steganography. Attacks on industrial holdings are far more unusual than campaigns against diplomats and other nation-state targets, according to Kaspersky. The APT uses a toolset that it calls MT3, which consists of separate modules.

Source: https://threatpost.com/montysthree-apt-industrial-targets/159957/

Exit mobile version