
APT41 Espionage Strikes Southern African Government IT
The attackers infiltrated the network by exploiting a publicly exposed web server, carrying out registry dumping to harvest credentials for a local administrator account and a backup solution account with domain‑wide privileges. These credentials enabled lateral movement and elevation of access across the organisation's network.
Once embedded, the threat actors deployed a suite of both custom and public reconnaissance tools. A modified Pillager stealer was converted into a DLL to exfiltrate browser, database and admin tool credentials, screenshots, source code, active chats, email correspondence, and more. Additionally, the Checkout stealer captured browser history, downloaded files, stored passwords and credit card information. The attackers also utilised RawCopy and a Mimikatz DLL to extract registry secrets, while Cobalt Strike served as their primary command‑and‑control mechanism.
ADVERTISEMENT
Unusually, the attackers leveraged the internal SharePoint server as a covert C2 channel, embedding a custom web‑shell to send and receive commands. This tactic allowed them to mask illicit operations within legitimate internal communications, minimising suspicion.
Further probing revealed use of Impacket modules WmiExec and Atexec, which fetched reconnaissance outputs and exfiltrated SAM and SYSTEM registry hives from compromised hosts. A later phase of the operation involved the deployment of a malicious HTA file via a domain impersonating GitHub, used to establish a reverse shell—locking down persistent access.
This marks one of APT41's most comprehensive operations in Africa, a region previously experiencing minimal activity from this actor. Analysts highlight the full deployment of the group's TTPs—spanning stealthy reconnaissance, lateral movement, data harvesting, and covert command channels.
Denis Kulik, Lead SOC Analyst at Kaspersky MDR, emphasised the challenge such campaigns present: 'Defending against such sophisticated attacks is impossible without comprehensive expertise and continuous monitoring of the entire infrastructure'. Culprits' integration of both bespoke stealer implants and legitimate tools like Mimikatz and Cobalt Strike underlines their adaptive and stealthy approach.
The incident underscores growing cyber‑espionage interest in African government IT systems. APT41, active across 42 countries, now appears to be intensifying surveillance operations on the continent. Organisations are urged to ensure full security agent deployment across endpoints, enforce least privilege principles, and monitor internal services rigorously. Kaspersky also recommends adopting advanced solutions such as EDR/XDR and managed detection and response services, along with threat intelligence offerings to anticipate and counter complex intrusions.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Tahawul Tech
4 hours ago
- Tahawul Tech
Nvidia restarts manufacturing on H20 AI chips
Nvidia is ramping up production of a China-specific AI chip via its Taiwan-based contract manufacturer, with strong demand prompting it to not rely on existing inventories, Reuters reported. The news agency stated Nvidia ordered 300,000 H20 chips from Taiwan Semiconductor Manufacturing Co, with stocks of the chip at between 600,000 and 700,000. In 2024, Nvidia sold about a million H20 chips in the mainland. In mid-July, the company said US authorities confirmed it would be given a licence to resume sales of its H20 chip in China. But opposition to the re-opening of sales drew sharp criticism from security experts and politicians in the US. The US government noted the move to resume H20 sales, which from April required an export licence, was part of negotiations with China over rare earth minerals, Reuters wrote. Nvidia reconfigured its high-end offerings for China after the US imposed export controls on the H100 in October 2023. Source: Mobile World Live Image Credit: Nvidia


Tahawul Tech
4 hours ago
- Tahawul Tech
India is now the top U.S smartphone supplier
India has taken the spot as the largest smartphones supplier to the US in Q2 2025, overtaking China for the first time due to Apple's shift away from Chinese manufacturing. Canalys data revealed that smartphones assembled in India accounted for 44 per cent of the 27.1 million units shipped to the US during the quarter, up from 13 per cent in the same period last year. In contrast, China's share of US-bound smartphone shipments fell to 25 per cent, down from 61 per cent. The company reported the volume of made-in-India smartphones shipped to the US rose 240 per cent year-on-year, driven primarily by Apple, with Samsung and Motorola also increasing their US-focused manufacturing in the country. Vietnam, which houses a major portion of Samsung's production, ranked second with 30 per cent. Sanyam Chaurasia, Principal Analyst at Canalys noted the shift came due to Apple's ongoing efforts to diversify its manufacturing base away from China in a bid to mitigate the looming threat of US tariffs. The iPhone-maker significantly increased production in India over the past year, with much of the output bound for the US market. The tech giant has started assembling Pro models of the iPhone 16 series in India, although large-scale production for the US still relies on facilities in China. Despite the shift, total smartphone shipments to the US grew just 1 per cent. Apple's shipments declined by 11 per cent to 13.3 million units, while Samsung reported 38 per cent annual growth reaching 8.3 million units driven by its Galaxy A-series. 'Apple built up its inventories rapidly toward the end of Q1 and sought to maintain this level in Q2', said Runar Bjorhovde, Senior Analyst at Canalys. However, Bjorhovde noted that the market's modest overall growth 'despite vendors frontloading inventory' to mitigate the impact of potential tariffs later this year highlights 'tepid demand in an increasingly pressured economic environment'. Apple's international manufacturing ambitions have drawn sharp criticism from US President Donald Trump in recent months, who warned that iPhones not built in the US could face a 25 per cent tariff. Indeed, Trump told Apple CEO Tim Cook in May: 'We are not interested in you building in India.' Source: Mobile World Live Image Credit: Stock Image


Gulf Business
8 hours ago
- Gulf Business
Crypto scam alert: 5 things to know about the new Google Forms fraud, says Kaspersky
Image: Getty Images/ For illustrative purposes Kaspersky researchers have flagged a new scam campaign targeting cryptocurrency users by abusing the legitimacy of Google Forms. Here's what you need to know: 1. The scam starts with a fake Google Forms confirmation Attackers are using Google Forms – a free tool typically used for surveys – to trigger automated confirmation emails. These emails appear to come from Google itself, tricking users into thinking they've received a legitimate crypto transaction alert. The form usually includes only one field: the user's email address. 2. Emails mimic crypto exchange notifications The phishing emails are carefully designed to look like alerts from a cryptocurrency exchange. They mention a pending crypto payout and urge users to click a link before the offer 'expires.' This manufactured urgency pushes recipients to act without verifying the source. 3. Clicking the link takes you to a scam site If the user clicks the link, they land on a website made to resemble a crypto transaction platform. Here, victims are asked to contact so-called 'blockchain support' and make a small commission payment in cryptocurrency to receive the fake transfer. Following this process often leads to loss of funds, as the entire transaction is fabricated. 4. The attack bypasses spam filters using trusted infrastructure Since the email is technically sent from a legitimate Google domain, it often passes through spam filters undetected. This makes the scam harder to identify. The combination of a real Google email address and familiar design elements can deceive even cautious users. 5. Stay vigilant Andrey Kovtun, Email Threats Protection group manager at Kaspersky, warns that 'the campaign demonstrates a cunning exploitation of a trusted platform.' Avoid clicking unexpected links Watch for suspicious details like unfamiliar Google Forms content Use reliable security tools to block fraudulent sites If an email promises free crypto but asks for payment first, it's likely a scam. Users should verify the source and never trust links blindly — even if the sender appears legitimate. Read: