Summary:

1. BlackTech APT hackers have been attacking various sectors since 2010, including government, factories, technology, media, electronics, phones, and the military.

2. They use custom-made malicious software, tools, and techniques to mask their activities and evade detection.

3. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Japan National Police Agency (NPA) have demonstrated the capabilities of BlackTech in modifying router firmware and exploiting routers' domain-trust relationships.

4. BlackTech actors continuously update their tools and steal code-signing certificates to make their malware appear legitimate.

5. Their current campaign targets international subsidiaries of U.S. and Japanese companies.

6. They exploit trusted network relationships to expand their access in target networks.

7. Mitigation steps to combat BlackTech's malicious activity include monitoring unusual traffic and unauthorized downloads, as well as patching vulnerabilities.

Hashtags: #BlackTech #cyberattack #cybersecurity #databreach

https://cybersecuritynews.com/blacktech-apt-hackers-routers/

Reply to this note

Please Login to reply.

Discussion

No replies yet.