Analysis of the custom tools and techniques of recent HoneyMyte APT campaigns |
Abstract
The HoneyMyte APT also known as Temp.Hex or Mustang Panda has been active for several years. Over the past couple of years, HoneyMyte focused on various targeting profiles and also adopted different techniques to perform their attacks. Since mid 2018, the HoneyMyte APT conducted several attack campaigns targeting local high profile government organizations of Asian and African countries, along with their remote foreign embassies located in a number of countries including Australia. This presentation is focused on the analysis of the more interesting aspects of the toolset used by this threat actor in their recent campaigns as well as their various infection vectors and the unique lateral movement tools. Speaker Bio: Noushin is a senior security researcher in the Global Research & Analysis Team (GReAT) at kaspersky. Her research focuses on the investigation of advanced cyber criminal activities and targeted attacks with a particular focus on local threats in the Asia Pacific region. Noushin is very active in the local cyber security community in Australia and New Zealand by regularly presenting at various security conferences and events and also delivering technical workshops. |