🇻🇳Vietnamese APT
Vietnamese Advanced Persistent Threat (APT) groups are known for their sophisticated cyber-espionage and information-gathering operations. They often target political, governmental, and economic entities both within Vietnam and internationally. Here is a list of notable Vietnamese APT groups:
Notable Vietnamese APT Groups
APT32 (OceanLotus, SeaLotus)
Affiliation: Likely associated with Vietnamese interests, potentially state-sponsored
Targets: Government agencies, political figures, businesses, and individuals, primarily in Southeast Asia but also globally.
Notable Activities:
Cyber-Espionage: Targeting various sectors to gather intelligence and disrupt operations.
Social Engineering: Employing sophisticated phishing and spear-phishing campaigns to gain unauthorized access to sensitive information.
Recent Campaigns: Involved in attacks on international organizations, including those related to human rights and dissidents.
APT34 (OilRig, Helix)
Affiliation: While primarily Iranian, this group has shown some coordination with Vietnamese interests.
Targets: Financial, energy, and telecommunications sectors.
Notable Activities:
Espionage and Data Theft: Conducting operations focused on critical infrastructure and economic espionage.
APT37 (Reaper, RedAlpha)
Affiliation: Primarily Iranian but occasionally operates with coordination from Vietnamese interests.
Targets: Government agencies, military, and technology sectors.
Notable Activities:
Cyber-Espionage: Focused on gathering sensitive information from various high-profile targets.
APT39
Affiliation: Associated with Vietnamese interests
Targets: Government officials, political figures, and various organizations in Southeast Asia.
Notable Activities:
Targeted Attacks: Engaging in espionage and information gathering, often involving sophisticated malware and social engineering tactics.
Characteristics and Tactics
Phishing and Spear-Phishing: Many Vietnamese APT groups use phishing emails and social engineering to trick targets into revealing credentials or downloading malware.
Custom Malware: Development and deployment of custom malware and tools for espionage and data exfiltration.
Espionage and Surveillance: Targeting political, governmental, and economic entities to collect sensitive information or disrupt operations.
Last updated