Blog
>
Cyberthreats
4
 Min read

Outlaw APT Group: Evolution of Tactics from Cryptomining to Phishing and Spear Phishing

Published on 
Dec 26, 2023
Outlaw APT Group

Introduction:

The Outlaw Advanced Persistent Threat (APT) group, once known for cryptomining and brute force attacks, has undergone a significant shift in their tactics. They are now actively engaged in phishing activities, using spoofed mail servers to conduct sophisticated email phishing and spear phishing campaigns. This article explores the group’s transition from their previous activities to their current focus on email-based attacks, highlighting the common trend of APTs frequently changing their tactics to remain elusive.

Previous Activities: Cryptomining and Brute Force Attacks

In the past, the Outlaw APT group primarily focused on two main activities – cryptomining and conducting brute force attacks. They leveraged a multi-purpose botnet to mine for Monero, a popular cryptocurrency, on both Android and Linux systems. Additionally, the botnet facilitated brute force attacks and exploited RDP vulnerabilities to escalate privileges on targeted systems.

Changing Tactics: Phishing and Spear Phishing

Recently, the Outlaw APT group has shifted its attention towards email-based attacks, particularly phishing and spear phishing. By deploying spoofed mail servers, they can create convincing and deceptive emails that appear legitimate to unsuspecting recipients.

Email Phishing:

The group engages in email phishing campaigns, casting a wide net to target a large number of users. They send mass emails that impersonate trusted organizations or individuals, enticing recipients to click on malicious links or download infected attachments. These phishing emails often lure victims into revealing sensitive information, such as login credentials or financial details.

Spear Phishing:

In addition to email phishing, Outlaw APT has adopted spear phishing techniques to target specific individuals or organizations. These targeted attacks involve careful research and customization to craft emails that appear highly personalized and credible. By leveraging social engineering tactics, the threat actors can exploit human vulnerabilities, increasing the success rate of their attacks.

APT’s Adapting Strategies

The Outlaw APT group’s shift from cryptomining and brute force attacks to phishing activities is not an isolated case. APTs, in general, are known for their dynamic nature, constantly adapting their tactics to evade detection and maintain effectiveness. Some reasons why APTs change activities include:

1. Evasion: APTs change their techniques to stay ahead of security measures, making it challenging for defenders to predict and prevent their actions.

2. Evolving Technology: As technology advances, APTs exploit new vulnerabilities and attack surfaces, seeking greater opportunities for infiltration.

3. Changing Objectives: The motives of APT groups may shift over time, leading them to focus on different goals and targets.

4. Profitability: APT groups may shift to activities that promise higher financial gains or geopolitical advantages.

Conclusion:

The Outlaw APT group’s transition from cryptomining and brute force attacks to email-based phishing and spear phishing demonstrates the flexibility and adaptability of modern cyber threat actors. Their utilization of spoofed mail servers emphasizes the importance of vigilance and user awareness in identifying potential phishing attempts. As APTs continue to evolve their tactics, organizations must invest in robust cybersecurity measures, employee training, and threat intelligence to protect against the ever-changing landscape of cyber threats.