Table of Contents
  • Home
  • /
  • Blog
  • /
  • Top 10 Advanced Persistent Threat (APT) Groups of 2024
March 1, 2025
|
9m

Top 10 Advanced Persistent Threat (APT) Groups of 2024


An infographic displaying the top 10 advanced cyber threats of 2024, highlighting APT1, Lazarus Group, and APT28 with brief descriptions and associated images.

The year 2024 has witnessed an unrelenting barrage of cyberattacks, orchestrated by an ever-evolving landscape of Advanced Persistent Threat (APT) groups. These sophisticated actors, often backed by nation-states, continue to refine their tactics, techniques, and procedures (TTPs), posing a significant threat to governments, critical infrastructure, and businesses worldwide.

This blog post delves into the top 10 APT groups that have left their mark on the cyber battlefield in 2024, examining their motivations, targets, and the innovative approaches they employ. We'll also explore the key trends shaping the APT landscape and offer actionable advice for organizations seeking to bolster their defenses. Staying ahead of cybersecurity threats requires constant vigilance.

Defining the Battlefield: What Makes an APT Group "Top"?

Before diving into the list, it's crucial to define what criteria we use to identify the "top" APT groups. Several factors contribute to this assessment, including:

  • Sophistication: The level of technical expertise demonstrated in their attacks, including the use of zero-day exploits, custom malware, and advanced evasion techniques.

  • Impact: The scale and severity of their attacks, measured by data breaches, financial losses, disruption of critical services, and geopolitical consequences.

  • Persistence: Their ability to maintain long-term access to compromised systems, enabling sustained espionage or sabotage.

  • Innovation: The development and deployment of new attack methods and tools that push the boundaries of cyber warfare.

  • Geographic Reach: The extent to which their attacks span across different countries and regions.

  • Strategic Alignment: The degree to which their activities support the political, economic, or military objectives of their state sponsors.

The Top 10 APT Groups of 2024: A Who's Who of Cyber Espionage and Sabotage

Based on these criteria, here are ten APT groups that have demonstrably shaped the cyber threat landscape in 2024:

1. Lazarus Group (North Korea): Financial Cybercrime and Beyond

Also known as APT38, Lazarus Group remains a formidable force, primarily driven by financial gain to circumvent international sanctions against North Korea. In 2024, they've expanded their repertoire beyond targeting financial institutions, venturing into new areas like the nuclear sector. The group's persistent attacks requires proper vulnerability assessments.

  • Notable Activities in 2024: Lazarus extended its DeathNote (Operation DreamJob) campaign, targeting nuclear sector employees. Exploited a Google Chrome zero-day via a fake DeFi game and developed a macOS persistence technique using extended attributes (EAs). Fake job lures continue to be a favorite tactic.

  • Why They Made the List: Lazarus Group's continued innovation, diversification of targets, and proven ability to generate illicit revenue make them a top-tier threat. Their collaboration with ransomware operations is also a growing concern.

2. APT29 (Cozy Bear/Russia): Masters of Espionage

Linked to Russia's Foreign Intelligence Service (SVR), APT29 is renowned for its sophisticated espionage campaigns targeting government, diplomatic, and research organizations worldwide. Their focus is strategic intelligence gathering to inform Russian foreign policy. Threat intelligence is very important to defend against these attacks.

  • Notable Activities in 2024: APT29 launched phishing campaigns using Zero Trust Architecture (ZTA) themes to steal Windows credentials via RDP. They also employed ROOTSAW/EnvyScout (malware dropper) and WINELOADER (a new variant) with DLL sideloading for stealth.

  • Why They Made the List: APT29's persistence, advanced techniques, and strategic targeting underscore their importance as a top-tier espionage threat. The group's campaigns are meticulously planned and executed.

3. Volt Typhoon (China): Targeting Critical Infrastructure

Volt Typhoon, attributed to China, has raised alarms due to its focus on U.S. critical infrastructure, including communications, energy, and transportation sectors. Their aim appears to be establishing a foothold for potential disruptive attacks in the event of a geopolitical conflict. Security logging and monitoring is crucial to identify such attacks.

  • Notable Activities in 2024: Volt Typhoon revived botnet operations, compromising Cisco RV320/325 routers and Netgear firewalls for stealthy command-and-control (C2) communication.

  • Why They Made the List: Volt Typhoon's focus on critical infrastructure makes them an exceptionally dangerous actor. The group's stealthy tactics and use of compromised network devices highlight the challenges of detecting and preventing their attacks. The usage of Living off the Land techniques contributes to their success.

4. OilRig (Iran): Access Broker Extraordinaire

Also known as APT34 and UNC1860, OilRig acts as an initial access broker, providing other Iranian APT groups with access to compromised networks. Their targets primarily include Middle Eastern governments and telecommunications providers. Incident response plan is helpful when such groups attack.

  • Notable Activities in 2024: OilRig used TemplePlay and ViroGreen malware and employed sophisticated techniques to maintain persistence, including the use of legitimate Iranian antivirus software components.

  • Why They Made the List: OilRig's role as an access broker amplifies the impact of other Iranian APT groups, making them a critical component of the Iranian cyber threat ecosystem.

5. RomCom (Attribution Uncertain): Zero-Day Deployers

Also known as UNC2596, RomCom stands out for its willingness to deploy zero-day vulnerabilities, demonstrating a high level of technical capability and a disregard for collateral damage.

  • Notable Activities in 2024: RomCom deployed two zero-day vulnerabilities (Mozilla & Windows) to deliver its backdoor. It shifted toward intelligence-gathering efforts, targeting entities primarily in Europe and North America.

  • Why They Made the List: The use of zero-days and the shift in focus demonstrate the group's capacity for technical innovation and adaptability. Addressing software and data integrity failures is crucial to defend against such groups.

6. Earth Estries (China): Telecoms and Persistent Access

Also known as Salt Typhoon, Earth Estries (likely Chinese state-sponsored) has focused on telecommunications providers and government entities, particularly in the U.S., Taiwan, and Southeast Asia. Their goal is long-term intelligence collection.

  • Notable Activities in 2024: Exploited VPNs, firewalls, and email servers to deploy SNAPPYBEE, DEMODEX, and GHOSTSPIDER for persistent access. They are known to exploit well-documented vulnerabilities (CVE-2023-46805, CVE-2024-21887, CVE-2023-48788, CVE-2022-3236, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065).

  • Why They Made the List: The group's persistent attacks against critical infrastructure and exploitation of known vulnerabilities demonstrate their commitment to long-term intelligence gathering. Patch management strategy is critical to defend against these attacks.

7. Charming Kitten (Iran): Aerospace and Hack-and-Leak Campaigns

Also known as APT35 and TA453, Charming Kitten is an Iranian APT group known for its cyber espionage and hack-and-leak operations, targeting a wide range of sectors, including academia, media, and government. In 2024, their activities have intensified, with a particular focus on aerospace and defense.

  • Notable Activities in 2024: Targeted aerospace, aviation, and defense sectors via fake job offers (SnailResin malware) and used advanced evasion techniques. Charming Kitten used BellaCPP malware (a C++ variant of BellaCiao) for persistent access, targeting entities in the Middle East.

  • Why They Made the List: Charming Kitten's diverse targeting, sophisticated social engineering tactics, and willingness to engage in hack-and-leak operations make them a significant threat to a wide range of organizations. Email authentication mechanisms such as SPF and DKIM, can help mitigate these attacks.

8. Kimsuky (North Korea): Credential Theft and Supply Chain Attacks

Kimsuky, a North Korean APT, is known for its relentless focus on credential theft and supply chain attacks, primarily targeting South Korean organizations, including government agencies, defense contractors, and research institutions.

  • Notable Activities in 2024: Kimsuky ramped up credential theft operations, spoofing Russian domains to bypass email security measures. They employ a strategy of registering malware as a service for reliable persistence.

  • Why They Made the List: Kimsuky's persistence, sophisticated social engineering tactics, and focus on supply chain attacks make them a significant threat to organizations in South Korea and beyond. Defending against supply chain attacks is critical to defend against these attacks.

9. Sandworm (Russia): Disruptive and Destructive Capabilities

Sandworm, attributed to Russia's GRU military intelligence, is notorious for its disruptive and destructive cyberattacks, including the NotPetya ransomware attack in 2017 and attacks against Ukrainian critical infrastructure. Protecting against DDoS attacks is crucial to defend against disruptive attacks.

  • Notable Activities in 2024: Exploited fraudulent Army+ websites to target Ukrainian soldiers.

  • Why They Made the List: Sandworm's proven capability to carry out large-scale disruptive and destructive attacks makes them a major threat to critical infrastructure worldwide.

10. Tropic Trooper (China): Espionage in Southeast Asia

Tropic Trooper, also known as APT23 and Pirate Panda, is a Chinese APT group that has been active since 2011, primarily targeting government entities and critical infrastructure in Southeast Asia. Their focus is on long-term intelligence gathering.

  • Notable Activities in 2024: Persistent campaigns against a government entity in Egypt.

  • Why They Made the List: Although not as technically sophisticated as some other APT groups, Tropic Trooper's persistence and focus on a strategically important region make them a noteworthy threat.

Key Trends Shaping the APT Landscape in 2024

Several key trends have characterized the APT landscape in 2024:

  • The Rise of Initial Access Brokers: Groups like OilRig demonstrate the growing specialization within the cybercrime ecosystem.

  • Exploitation of Known Vulnerabilities: The exploitation of known vulnerabilities remains a persistent problem.

  • Zero-Day Vulnerabilities in the Spotlight: APTs are increasingly leveraging zero-day vulnerabilities.

  • Cloud Services as a Prime Target: Cloud environments are now firmly in the crosshairs of APT groups.

  • Geopolitical Tensions Fueling Cyber Activity: Geopolitical conflicts and tensions are driving an increase in state-sponsored cyberattacks.

Defending Against the Onslaught: Actionable Advice for Organizations

Protecting against APT attacks requires a multi-layered security approach that encompasses technology, processes, and people. Here are some actionable steps organizations can take to bolster their defenses:

  • Implement a Robust Threat Intelligence Program: Stay informed about the latest APT threats and TTPs.

  • Prioritize Patch Management: Regularly and promptly patch known vulnerabilities in software and hardware.

  • Enforce Multi-Factor Authentication (MFA): MFA is essential for protecting against credential theft.

  • Strengthen Network Security: Implement network segmentation, intrusion detection systems, and firewalls.

  • Train Employees to Recognize Phishing Attempts: Educate employees about social engineering tactics and how to identify suspicious emails and links.

  • Develop and Test Incident Response Plans: Be prepared to respond quickly and effectively to a cyberattack.

  • Adopt a Zero Trust Architecture: Limit the impact of breaches by implementing zero trust security principles, verifying every user and device before granting access to resources.

Conclusion: Vigilance is Key

The APT landscape is constantly evolving, with new groups emerging and existing groups refining their tactics. Staying ahead of these threats requires constant vigilance, proactive security measures, and a commitment to continuous improvement. By understanding the motivations, targets, and techniques of the top APT groups, organizations can better prepare themselves to defend against the inevitable cyber onslaught. The key to defending yourself is to understand the cyber security landscape.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Top 10

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe