Magazine Button
Trellix detects China-affiliated APT groups behind most nation-state threat activity 

Trellix detects China-affiliated APT groups behind most nation-state threat activity 

CybersecurityResearchTop Stories

Trellix, a cybersecurity company delivering the future of extended detection and response (XDR), has released the June 2023 edition of The CyberThreat Report from the Trellix Advanced Research Center which analyses cybersecurity trends from the last quarter. Insights were gleaned from a global network of expert researchers who analyse over 30 million detections of malicious samples daily. Combined telemetry is collected from one billion sensors and data from open and closed-source intelligence. 

“A year into the Russia-Ukraine conflict, offensive cyber capabilities are being leveraged strategically by nation-states for espionage and disruption,” said John Fokker, Head of Threat Intelligence, Trellix Advanced Research Center. “For both leading and developing countries, we see risks to critical infrastructures like telecommunications, energy and manufacturing by notable APT groups – a warning to public and private organisations to deploy modern protections to stay ahead of rapidly evolving threats.” 

The latest Trellix Advanced Research Center report covers the first quarter of 2023 and is comprised of evidence of activity linked to ransomware and nation-state-backed APT actors, threats to email, malicious use of legitimate security tools and more.

The CyberThreat Report includes proprietary data from Trellix’s sensor network, investigations into nation-state and cybercriminal activity by the Trellix Advanced Research Center, open and closed-source intelligence and threat actor leak sites. The report is based on telemetry related to detection of threats when a file, URL, IP address, suspicious email, network behaviour, or other indicator is detected and reported by the Trellix XDR platform. 

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive