Cyber Attack Groups (Expert)

123456789
Across
  1. 2. Bear Another Russian state-sponsored group, APT29 is known for its sophisticated and stealthy cyber espionage campaigns. They have targeted governments, think tanks, and diplomatic organizations.
  2. 4. They been involved in various cyber attacks, including the destructive 2015 and 2016 attacks on Ukraine's power grid and the NotPetya ransomware attack.
  3. 7. This Chinese cyber attack group operates both for personal gain and state interests. They engage in cyber espionage, financially motivated attacks, and supply chain compromises, targeting a wide range of industries globally.
  4. 8. Believed to be linked to Iran, APT34 focuses on cyber espionage campaigns targeting organizations in the Middle East, particularly in the energy, telecommunications, and chemical industries.
  5. 9. Originating from Vietnam, APT32 has been involved in cyber espionage campaigns targeting Southeast Asian countries, particularly focusing on political, media, and human rights organizations.
Down
  1. 1. Linked to North Korea, Lazarus Group has conducted several notable cyber attacks, including the 2014 Sony Pictures hack and the 2017 WannaCry ransomware attack. They have targeted financial institutions, critical infrastructure, and cryptocurrency exchanges.
  2. 3. This advanced persistent threat group targets individuals in the hospitality industry, mainly executives and high-profile business travelers, using sophisticated social engineering and zero-day exploits to gain access to their devices and networks.
  3. 5. Widely believed to be associated with the United States' National Security Agency (NSA), Equation Group is known for developing and deploying highly sophisticated cyber weapons, including the Stuxnet worm and various advanced persistent threats (APTs).
  4. 6. also known as FIN7 or Anunak, is a financially motivated cyber criminal group that has targeted banks, hospitality, and retail sectors. They are known for their sophisticated hacking techniques and large-scale data breaches.