<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img src="http://info.threatstop.com/hubfs/cloud%20hopper.jpg" alt="cloud hopper.jpg" width="453" height="255"></p> <p><a href="https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-report-final-v4.pdf">Operation Cloud Hopper</a>, uncovered by researchers at BAE Systems and PwC, was a cyberespionage campaign by <strong>APT10</strong> (also known as <strong>Red</strong> <strong>Apollo</strong> and the <strong>menuPass</strong> <strong>Team</strong>) that targeted IT managed service providers (MSPs) in order to steal their clients' corporate data.</p> <!--more--> <p>Attackers accessed this novel attack vector using stolen administrative credentials, obtained through spear-phishing emails and malicious documents sent to the MSPs.</p> <p>Once the threat group successfully compromised the MSP, they were able to pivot onto their target's network through the shared network infrastructure between the MSP and their clients. Data was exfiltrated through the MSP itself, which made detecting the APT's movements more difficult, as this network traffic appeared to be legitimate.</p> <p>This campaign used the custom <a href="https://www.us-cert.gov/sites/default/files/publications/IR-ALERT-MED-17-093-01C-Intrusions_Affecting_Multiple_Victims_Across_Multiple_Sectors.pdf">RedLeaves RAT</a>, which could enumerate a victim's system and execute commands issued by the APT's command and control server.</p> <p>Victims were chosen from a wide pool of industries, such as retailers and technology companies, and came from all over the globe.</p> <p><strong>APT10</strong>, <a href="https://www.scmagazine.com/report-exposes-apt-10s-cloud-hopper-campaign/article/648775/">first seen in 2009</a>, is suspected to be based in China and is known for targeting defense and government organizations in the United States.</p> <p>A US-CERT Alert on this campaign is available on their <a href="https://www.us-cert.gov/ncas/alerts/TA17-117A">website</a>.</p> <p>ThreatSTOP IP Firewall Service and DNS Firewall Service protect against APT10's latest campaign when TSCritical targets are enabled.</p> <p><span style="font-size: 12.1612px; text-align: center; background-color: transparent;">For more information or to get started with a free trial, visit us <a href="https://www.threatstop.com/index.php?page=index&amp;action=trial" target="_blank">here</a>.</span><span style="font-size: 12.1612px; text-align: center; background-color: transparent;">&nbsp;</span></p></span>