
ESET’s latest APT Activity Report for Q2-Q3 2024 reveals significant developments in state-aligned cyber threats, with China, Iran, North Korea, and Russia expanding their operations globally. The report highlights new tactics including webmail exploits, cloud service abuse, and potential cyber-kinetic coordination by Iranian groups. Security leaders must prioritize patching, cloud controls, and VPN monitoring to counter these advanced threats.
Evolving APT Landscape
The ESET report documents how state-aligned groups are refining their tools and expanding target profiles. China’s MirrorFace breached EU diplomatic targets for the first time, while Russian groups exploited XSS vulnerabilities in Roundcube and Zimbra webmail servers. North Korean actors shifted toward cloud service abuse, and Iranian groups showed potential links between cyber operations and physical military activities.
China-Aligned APTs: Geographic Expansion and VPN Reliance
Chinese threat actors demonstrated strategic shifts with MirrorFace targeting EU diplomatic entities alongside traditional Japanese targets. Multiple China-aligned groups adopted SoftEther VPN for network persistence, with Flax Typhoon, Webworm, and GALLIUM all leveraging VPN bridges in government and telecom networks. The report includes detection rules for identifying SoftEther VPN bridge activity in enterprise environments.
Iranian Cyber Operations: Potential Kinetic Links
Iran-aligned groups showed concerning patterns suggesting cyber-kinetic coordination, particularly in targeting Israel’s transportation sector and African financial services. MuddyWater’s 13-hour LSASS memory dumping attempts using advanced tools like MirrorDump indicate growing offensive capabilities. The group maintained focus on diplomatic targets in France and US educational institutions.
North Korean Financial Targeting and Cloud Abuse
Lazarus Group continued Operation DreamJob against defense sectors while developing new DeceptiveDevelopment attacks on freelance developers. Kimsuky abused Microsoft Management Console files and cloud services like Google Drive for data exfiltration. The report marks the first observed APT use of Zoho WorkDrive by North Korean actors.
Russian Webmail Exploits and Ukrainian Focus
Russian groups heavily targeted Roundcube and Zimbra webmail servers via XSS vulnerabilities, with Sednit’s Operation RoundPress affecting governments across six countries. Sandworm deployed new Windows/Linux malware including WrongSens and LOADGRIP. Gamaredon maintained intense focus on Ukraine with enhanced PowerShell tools for persistence.
Key Defense Recommendations
Network defenders should prioritize webmail server patching, implement strict Content Security Policies, and monitor for suspicious Sieve filter changes. Organizations using SoftEther VPN should audit installations for unexpected bridge connections. Cloud service controls and user education on document handling risks (.msc files) are critical for mitigating these evolving threats.
A Call for Vigilance
The ESET report underscores how state-aligned APT groups continue to refine their tactics while expanding operational scope. The cybersecurity community must maintain threat intelligence sharing and develop adaptive defenses against these persistent, well-resourced adversaries targeting critical infrastructure and sensitive data globally.