Skip to main content
. 2023 Jun 16;9(7):e17156. doi: 10.1016/j.heliyon.2023.e17156

Table 3.

Real cases of advanced persistent threat (APT) attacks.

APT case Platform Target APT technique Impact
Stuxnet [26] Computer Iran's uranium nuclear project Malware Disturb critical components
CloudAtlas [27] Mobile A civil servant, an oil and financial CEO Application repackaging Leak sensitive information
Stealth Mango and Tangelo [28] Mobile Military, medical, and civilian personnel in Pakistan, Afghanistan, India, Iraq, Iran, and the UAE Watering hole Leak sensitive information
Carbanak [29] Mobile Banking/financial institutions Spear phishing Steal sensitive information
Hydraq [30] Computer Google Malware Steal organizational data
Marcher [31] Mobile Customers of Bank Austria, Raiffeisen Meine Bank, and Sparkasse Spear phishing Steal sensitive information
TwoSail Junk [32] Mobile & computer Users in Hong Kong Watering hole Cyber espionage
Transparent Tribe [33] Mobile & computer Government entities, military (Afghanistan, India, and Pakistan) Spear phishing Cyber espionage, data theft
Mata [34] Computer Corporate entities (Germany, India, Japan, Poland, South Korea, and Turkey) Malware Steal customer databases and distribute ransomware
DeathStalker [35] Computer Financial technology companies, law offices, wealth consultancy firms, financial sector Spear-phishing emails Steal sensitive business information
ZooPark [36] Mobile Focus on the victims of Middle Eastern targets in Egypt, Jordan, Morocco, Lebanon, and Iran. Watering hole Steal sensitive information
FinSpy [37] Mobile & computer Activists, criminal suspects (Vietnam, Canada, Germany, Indonesia, Japan, Mongolia, Russia, and Ukraine) Malware Surveillance
Adwind [38] Mobile & computer Financial institutions; government entities; healthcare, manufacturing, mass media and TV, shipping, software companies; telecoms, commerce (Germany, Hong Kong, India, Italy, Russia, Taiwan, Turkey, USA) Spear phishing Cyber espionage, surveillance
Hacking Team RCS [39] Mobile & computer Activists, criminal suspects, journalists, politicians (Germany, India, Iraq, Italy, Mexico, Russia, Turkey, Ukraine, and Vietnam) Malware Surveillance
Desert Falcons [40] Mobile & computer Victims representing the military and government, to targets of leading media entities and financial institutions Spear-phishing emails, watering hole Cyber espionage, data theft, surveillance