State-sponsored threats: Different objectives, similar access paths
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,了解主要信息。文章是关于2025年Talos的年度回顾,分析了来自中国、俄罗斯、朝鲜和伊朗的国家支持的网络威胁活动。 每个国家的情况有所不同:中国侧重于利用漏洞和身份盗窃,活动量大且高效;俄罗斯则与地缘政治目标相关,利用旧漏洞进行长期情报收集;朝鲜则依赖社会工程和内部访问,既有经济目的也有间谍活动;伊朗则结合破坏性攻击和长期访问,特别是在冲突期间。 文章还提到防御建议,比如不要忽视旧系统、加强身份安全、提高网络可见性等。因此,总结时需要涵盖这些国家的主要活动类型及其共同点,比如利用漏洞和长期潜伏。 接下来,我要将这些信息浓缩到100字以内。首先点明主题:Talos 2025年回顾分析了多国的网络威胁活动。然后分别简述每个国家的特点:中国高效利用漏洞;俄罗斯与地缘政治相关;朝鲜结合社会工程和内部访问;伊朗结合破坏性和长期访问。最后提到防御建议。 确保语言简洁明了,避免使用复杂的术语。这样用户就能快速了解文章的核心内容。 </think> Talos 2025年回顾分析了中国、俄罗斯、朝鲜和伊朗的国家支持网络威胁活动。中国侧重高效利用新旧漏洞进行持久访问;俄罗斯与地缘政治目标相关,依赖旧漏洞进行长期情报收集;朝鲜结合社会工程和内部访问实现金融与间谍目的;伊朗则结合破坏性攻击与长期潜伏。防御建议包括加强身份安全、提升网络可见性及关注全球事件关联性。 2026-4-14 13:52:49 Author: blog.talosintelligence.com(查看原文) 阅读量:12 收藏

Across the Talos 2025 Year in Review, state-sponsored threat activity from China, Russia, North Korea, and Iran all had varying motivations, such as espionage, disruption, financial gain, and geopolitical influence.

But when you look at how these operations actually unfold, similar tactics, techniques, and procedures (TTPs) keep appearing: access through vulnerabilities and identity, and access that remains under the radar for a considerable period of time.

Here are the dominant themes from the state-sponsored section of the Talos Year in Review, available now.

China

China-nexus threat activity stood out this year for both volume and efficiency, with Talos investigations increasing by nearly 75% compared to 2024.

Newly disclosed vulnerabilities were exploited almost immediately (e.g., ToolShell), sometimes before patches were widely available. At the same time, long-standing, unpatched vulnerabilities in networking devices and widely used software continued to provide reliable entry points for these types of adversary.

Once inside, the focus shifts to persistence. Web shells, custom backdoors, tunneling tools, and credential harvesting all support long-term access. 

There’s also more overlap than ever before between state-sponsored and financially motivated activity. It is likely that in some cases, state-sponsored actors conducted operations for personal profit alongside espionage-focused missions, while in others, cybercriminals collected valuable information during an attack that could be sold to espionage-motivated actors for further exploitation, providing them dual revenue streams.

Russia

Russian-linked cyber activity remains closely tied to their geopolitical objectives, particularly the war in Ukraine.

Many operations continue to rely on unpatched, older vulnerabilities (especially in networking devices) to gain initial access. These flaws provide a dependable way in for adversaries and support long-term intelligence gathering.

Russia’s offensive cyber activity is highly correlated with developments in the larger geopolitical sphere. For example, the announcement of sanctions intended to apply pressure on Russia by both the U.S. and E.U. often corresponded with our observed levels of Russian cyber activity.

Common malware families like Dark Crystal RAT (DCRAT), Remcos RAT, and Smoke Loader appeared frequently in Talos investigations on operations against Ukraine in 2025. These families aren’t exclusive to Russia-nexus threat actors, but they continue to be effective in environments where patching and visibility are inconsistent, and should therefore be high priority targets for defense and monitoring.

North Korea

North Korea cyber operations leaned heavily into social engineering and insider access in 2025. These operations were both for financial and espionage purposes.

Campaigns like Contagious Interview (orchestrated by Famous Chollima) used fake recruiters from legitimate companies to socially engineering targets to execute code or hand over credentials. From there, actors stole cryptocurrency, exfiltrated data, and established persistent access.

North Korean cyber actors also pulled off the largest cryptocurrency heist in history in 2025, stealing $1.5 billion. Additionally, thousands of IT workers used stolen identities and AI-generated profiles to secure positions at Fortune 500 companies, generating billions in annual revenue for North Korea’s nuclear weapons and ballistic missiles programs.

Iran

Iranian cyber threat activity in 2025 combined visible disruption with long-term access.

Hacktivist operations increased by 60% in response to geopolitical events, particularly the Israel-Hamas conflict. These campaigns, which include distributed denial-of-service (DDoS) attacks, defacements, and other disruptive operations, are often designed to generate attention and shape narratives.

At the same time, more traditional advanced persistent threat (APT) activity focused on persistence. Groups such as ShroudedSnooper targeted sectors like telecommunications, using custom compact backdoors designed to blend into normal traffic and remain undetected. 

ShroudedSnooper is an APT that public reporting widely attributes to Iran’s Ministry of Intelligence and Security (MOIS). It is very likely an initial access group that passes operations off to secondary threat actors for long term espionage or destructive attacks.

For current threat intelligence related to the developing conflict in Iran, follow our coverage on the Talos blog.

Guidance for defenders

Though the state-sponsored activity that we tracked for the Talos Year in Review have different objectives, they still have the same reliance on gaining and maintaining access. The following guidance is recommended for security teams:

  • Don’t ignore older systems: Both newly disclosed and long-known vulnerabilities are actively exploited. 
  • Prioritize identity security: Credentialed access and social engineering remain reliable entry points. 
  • Increase visibility into network and edge infrastructure: These systems are common targets for persistent access.
  • Expect activity to follow global events: Sanctions, conflicts, and political developments often correlate with spikes in activity. Follow the Talos blog to keep informed of new state sponsored activity and campaigns.
  • Inspect for long-term presence: Many state-sponsored operations are designed to persist stealthily over time, not trigger immediate disruption. 

文章来源: https://blog.talosintelligence.com/state-sponsored-threats-different-objectives-similar-access-paths/
如有侵权请联系:admin#unsafe.sh