Ethical Hacking News
A new report from Google highlights the increasing threat of state-sponsored actors targeting the defense industrial base (DIB) sector. According to the report, several countries including China, Iran, North Korea, and Russia are involved in this activity, using tactics such as malware delivery via secure messaging apps and operational relay box networks to gain access to sensitive information. The report provides an overview of the threat landscape and highlights several notable threat actors involved in these activities. As organizations in the DIB sector continue to evolve their security measures, it is essential to stay informed about these emerging threats.
Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia are targeting the defense industrial base (DIB) sector. The adversarial targeting is centered around four key themes: technology deployment on the battlefield, employee exploitation, edge device use, and supply chain risk. Google's report highlights several notable threat actors, including APT44, TEMP.Vermin, UNC5125, and others, involved in activities such as data exfiltration, malware distribution, and recruitment of drone operators. China-nexus groups are using operational relay box (ORB) networks for reconnaissance against defense industrial targets, while financially motivated actors carry out extortion against the sector and broader manufacturing base. The report emphasizes that the DIB sector is under a state of constant, multi-vector siege, with threat actors adapting their tactics to evade detection and response tools.
Google's threat intelligence division has released a report highlighting the growing threat landscape targeting the defense industrial base (DIB) sector. According to Google, several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on this critical infrastructure.
The adversarial targeting of the DIB sector is centered around four key themes: striking defense entities deploying technologies on the battlefield in the Russia-Ukraine War, directly approaching employees and exploitation of the hiring process by North Korean and Iranian actors, use of edge devices and appliances as initial access pathways for China-nexus groups, and supply chain risk stemming from the breach of the manufacturing sector.
Google's report highlights several notable threat actors involved in these activities. APT44 (aka Sandworm), a group also known for its involvement in the NotPetya ransomware attack, has attempted to exfiltrate information from Telegram and Signal encrypted messaging applications. TEMP.Vermin (aka UAC-0020) has used malware like VERMONSTER, SPECTRUM (aka SPECTR), and FIRMACHAGENT using lure content revolving around drone production and development, anti-drone defense systems, and video surveillance security systems.
UNC5125 (aka FlyingYeti and UAC-0149) has conducted highly targeted campaigns focusing on frontline drone units. It has used a questionnaire hosted on Google Forms to conduct reconnaissance against prospective drone operators, and distributed via messaging apps malware like MESSYFORK (aka COOKBOX) to an Unmanned Aerial Vehicle (UAV) operator based in Ukraine.
In addition, Google said it has also observed China-nexus threat groups utilizing operational relay box (ORB) networks for reconnaissance against defense industrial targets. ORBs confer several advantages to threat actors, allowing them to route their traffic through home or commercial networks, blend with regular network traffic, circumvent geofencing security controls, and pre-position themselves to a target's perimeter ahead of a cyber attack.
Google's report emphasizes that the broader trend is clear: the defense industrial base is under a state of constant, multi-vector siege. Financially motivated actors carry out extortion against this sector and the broader manufacturing base, like many of the other verticals they target for monetary gain.
"Many of the chief state-sponsors of cyber espionage and hacktivist actors have shown an interest in autonomous vehicles and drones, as these platforms play an increasing role in modern warfare," GTIG said. "Further, the 'evasion of detection' trend [...] continues, as actors focus on single endpoints and individuals, or carry out intrusions in a manner that seeks to avoid endpoint detection and response (EDR) tools altogether."
The report highlights several other notable threat actors, including UNC5792 (aka UAC-0195), which has exploited secure messaging apps to target Ukrainian military and government entities, as well as individuals and organizations in Moldova, Georgia, France, and the U.S. The threat actor is notable for weaponizing Signal's device linking feature to hijack victim accounts.
UNC6446, an Iranian-nexus threat actor that has used resume builder and personality test applications to distribute custom malware to targets in the aerospace and defense vertical across the U.S. and the Middle East, has also been identified by Google. APT43 (aka Kimsuky) has likely leveraged infrastructure mimicking German and U.S. defense-related entities to deploy a backdoor called THINWAVE.
Google's report provides valuable insights into the growing threat landscape targeting the defense industrial base sector. As such actors continue to adapt and evolve their tactics, it is essential for organizations in this sector to remain vigilant and implement robust security measures to protect themselves against these threats.
Related Information:
https://www.ethicalhackingnews.com/articles/A-Global-Threat-Landscape-State-Sponsored-Actors-Targeting-Defense-Industrial-Base-ehn.shtml
Published: Wed Feb 18 15:17:35 2026 by llama3.2 3B Q4_K_M