{"id":22771,"date":"2023-01-12T02:31:17","date_gmt":"2023-01-12T02:31:17","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=22771"},"modified":"2026-04-17T18:07:42","modified_gmt":"2026-04-17T18:07:42","slug":"analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/","title":{"rendered":"Analysis of Cyber Attack of APT Organization Confucius against Pakistan&#8217;s Intelligence-Based Operation"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Overview<\/strong><\/h2>\n\n\n\n<p>Affected by many factors, Pakistan has long suffered from serious local terrorism threats. The country has also taken counter-terrorism as an important national security strategy. In the second half of 2022, the Pakistani security forces carried out many intelligence-based operations (IBO) in Baluchistan, Khyber and North Waziristan, and killed many terrorists.<\/p>\n\n\n\n<p>Pakistan&#8217;s recent high-profile performance in counter-terrorism has attracted the attention of India. On November 30, 2022, NSFOCUS Security Labs spotted a cyber-attack against the armed forces in Multan, Pakistan. The attacker used the IBO action report in Lodhran District of Multan as bait to try to deliver a variant of the Trojan program to control the victim&#8217;s devices. After analysis, NSFOCUS Security Labs confirmed that the leader of the event was the Indian APT organization Confucius.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About Confucius<\/strong><\/h2>\n\n\n\n<p>Confucius is an APT organization funded by India. It has been carrying out cyber-attacks since 2013, mainly targeting Pakistan, China and other neighboring countries of India. It has a strong interest in the military, government agencies, energy and other fields.<\/p>\n\n\n\n<p>Confucius uses both the Windows and Android Trojan programs to spy on the target to steal intelligence. The attack tools include SubBird, CharSpy and Hornbill, which have strong development and penetration capabilities. &nbsp;<\/p>\n\n\n\n<p>In this attack, Confucius followed its common bait construction mode and used a new variant of the known attack tool MessPrint.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Attack Process<\/strong><\/h2>\n\n\n\n<p>In this cyber attack, Confucius attackers constructed a phishing document named &#8220;IBO_Lodhran. doc&#8221; and a phishing document named US_Dept_of_State_Fund_Allocations_for_Pakistan.doc&#8221;, targeting the security forces and diplomatic government departments of Pakistan respectively.<\/p>\n\n\n\n<p>These phishing documents carry intelligence content with a certain degree of authenticity, induce the victim to start the editing function of the document through a pop-up message, and then implement an attack process of embedding a variant Trojan horse.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-1..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-1..png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22772\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 1 pop-up message in phishing documents<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-2..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-2.-1024x656.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22774\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 2 Phishing document content&iuml;&frac14;&scaron;IBO_Lodhran.doc<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-3..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-3..png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22776\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 3 Phishing document content&iuml;&frac14;&scaron;US_Dept_of_State_Fund_Allocations_for_Pakistan.doc<\/p>\n\n\n\n<p>The typical attack process in this event is shown in the figure below.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-4..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-4..png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22778\"><\/a><\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 4 Typical attack process of this event<\/p>\n\n\n\n<p>When the macro in the above phishing document is executed, the document releases a file named gist.txt to the specified directory and set a scheduled task that runs every 30 minutes to run the file regularly.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-5..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-5..png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22780\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\"><\/p>\n\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 5 Scheduled tasks set by phishing documents<\/p>\n\n\n\n<p>The gist.txt is a PowerShell trojan actually. It initiates a link first to a fixed path tcp:\/\/142.234.157[.] 195:8080 to test connectivity, and uploads the user name, computer name, mac address, system information and other contents of this machine as registration information; Then it downloads encrypted data from the fixed path http:\/\/microsoftonedriver[.] com: 8989\/enc.txt and decrypts it as VERSION.dll and uses rundll32 to load and execute.<br>The VERSION.dll is the main Trojan program used by Confucius in this event, and the CnC it connected is tcp:\/\/info-updates.ddns[.]net:8080.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Trojan Analysis<\/strong><\/h2>\n\n\n\n<p>The main Trojan program VERSION.dll is a variant of a known attack component used by Confucius. To facilitate follow-up tracking, NSFOCUS Security Labs named the attack component MessPrint.<\/p>\n\n\n\n<p>Compared with previous versions, the MessPrint variant has changed greatly in terms of function and confrontation, and its main version number has also changed from 2.X.X to 3.1.0.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Function<\/strong><\/li><\/ul>\n\n\n\n<p>The main functions of the MessPrint variant this time are divided into three parts: operation log recording, victim host information uploading and command execution.<\/p>\n\n\n\n<p>It created a log file name log.txt first in the directory C: \\ProgramData. All prompt information in the subsequent stages would be recorded in the log file. We did not find this recording function in its previous versions, so we speculate that this variant is a test version directly used by Confucius in network attack activities.<\/p>\n\n\n\n<p>Subsequently, the Trojan program collected various information about the victim&#8217;s host, summarized this information into a piece of encrypted data and sent it to its CnC. The information collected by the Trojan is shown in the following table.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table1-1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"425\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table1-1-1024x425.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22793\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table1-1-1024x425.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table1-1-300x125.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table1-1-768x319.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table1-1-600x249.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table1-1-200x83.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table1-1.png 1115w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Table 1 List of information collected by MessPrint Variant<\/p>\n\n\n\n<p>The information above directly used the fixed symbol # $# * as the separator and the fixed symbol iqaz as the end sign.<br>The information above would be encrypted using the following encryption methods and then sent to CnC:<\/p>\n\n\n\n<p>    1. Byte-by-byte XOR 0x1D;<\/p>\n\n\n\n<p>    2.  Base64 transcoding;<\/p>\n\n\n\n<p>The subsequent communication between the variant and CnC follows the encryption methods above.<\/p>\n\n\n\n<p>After sending the host information, the variant and CnC used the keywords &#8220;check_status&#8221;, &#8220;verified&#8221;, &#8220;hi&#8221;, and &#8220;order&#8221; for multiple rounds of confirmation, and finally entered the instruction execution mode. In the command execution part, the MessPrint Trojan can respond to the following commands and parameters issued by CnC to download files, run programs, and execute CMD commands.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table-2.png\"><img decoding=\"async\" width=\"1024\" height=\"228\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table-2-1024x228.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22784\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table-2-1024x228.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table-2-300x67.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table-2-768x171.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table-2-600x134.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table-2-200x45.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/table-2.png 1392w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Table 2 CnC instruction list<\/p>\n\n\n\n<p>Through analysis, it is found that the MessPrint variant Trojan has made many changes in the functional part. On the one hand, it protects the CnC communication process through encryption, on the other hand, it greatly reduces functions like file stealing and rebound shell that exist in previous versions.<br>The changes above indicate that the positioning of the Trojan program has changed from full-function spyware to Stub-type backdoor Trojan, and the subsequent spying Trojan functions are separated into independent components through component splitting. This change is very common in the development of APT attack components in recent years. APT attackers can reduce the exposure risk of the overall framework through this refinement.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Combat<\/strong><\/li><\/ul>\n\n\n\n<p>In the MessPrint trojan program that appears this time, Confucius developers have added a lot of anti-analysis technology, which increases the difficulty of analyzing the trojan program.<\/p>\n\n\n\n<p>The MessPrint Trojan mainly uses an exception-based control flow obfuscation technology. This obfuscation changes the ordinary linear flow into a try-throw-catch structure so that the two original linearly connected code segments are divided into try-and-catch blocks that are no longer adjacent. In this way, the C++ object is thrown at a specific location, so that the execution process needs to jump to the code that can be executed directly under the linear structure through VS C++ exception handling.<\/p>\n\n\n\n<p>The following figure shows the basic logic of this exception-based control flow confusion:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-6..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Figure-6.-1024x546.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22786\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 6 Confusion ideas used by the MessPrint variant<\/p>\n\n\n\n<p>This confusion method can be used for static analysis of some decompilation tools because most pseudocodes cannot restore the above exception-handling process normally.<br>In addition, Confucius developers also abused some common code obfuscation techniques in the MessPrint variant, such as stack expansion, junk code and meaningless code, which further hindered static analysis. Considering a large number of traces in the development, we speculate that Confucius developers want to use confusion to reduce the losses caused by exposure when they have to enable the development version of the Trojan program.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>As a direct demonstration of the national armed forces in peacetime, a series of anti-terrorism operations recently held in Pakistan have made India very sensitive. The spotted APT attack also shows that India has begun to put cyber-attack forces into relevant reconnaissance activities.<\/p>\n\n\n\n<p>In the analysis, we found that Confucius developers still remain active in component development, and on the other hand, it also confirmed the prevalence of splitting and framing of attack components by APT developers. The improving defense capabilities in the APT capture, analysis and disclosure process in recent years compel APT attackers to use the framework idea to rebuild the attack tool and control the use of components at all levels through the way of level-by-level delivery to reduce the risk of complete exposure. &nbsp;<\/p>\n\n\n\n<p><strong>IoC<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Phishing documents:<\/li><\/ul>\n\n\n\n<p>c75b8c150054b5ba27cf08c46e13354e<\/p>\n\n\n\n<p>23537d81e9cd285b41185a0e4c3d37c1<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Encrypted PowerShell file: <\/li><\/ul>\n\n\n\n<p>ab34c3eb8635fc13e4a586cba3c7469d<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>CnC of PowerShell:<\/li><\/ul>\n\n\n\n<p>142.234.157[.]195:8080<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Download address: <\/li><\/ul>\n\n\n\n<p>http [:]\/\/microsoftonedriver [.]com:8989\/enc.txt<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>MessPrint variant program: <\/li><\/ul>\n\n\n\n<p>65d9b142924d4e74cb729166f41b16fa<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>MessPrint variant CnC:<\/li><\/ul>\n\n\n\n<p>info-updatesddns[.]net:8080<\/p>\n\n\n\n<p><strong>About NSFOCUS Security Labs<\/strong><\/p>\n\n\n\n<p>NSFOCUS Security Labs (NSL) is an internationally-recognized cybersecurity research and threat response center at the forefront of vulnerability assessment, threat hunting and mitigation research.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Overview Affected by many factors, Pakistan has long suffered from serious local terrorism threats. The country has also taken counter-terrorism as an important national security strategy. In the second half of 2022, the Pakistani security forces carried out many intelligence-based operations (IBO) in Baluchistan, Khyber and North Waziristan, and killed many terrorists. Pakistan&#8217;s recent high-profile [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":22789,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[93,94],"class_list":["post-22771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-apt","tag-apt-group"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analysis of Cyber Attack of APT Organization Confucius against Pakistan&#039;s Intelligence-Based Operation - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analysis of Cyber Attack of APT Organization Confucius against Pakistan&#039;s Intelligence-Based Operation - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Affected by many factors, Pakistan has long suffered from serious local terrorism threats. The country has also taken counter-terrorism as an\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-12T02:31:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Feature-Image.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Analysis of Cyber Attack of APT Organization Confucius against Pakistan&#039;s Intelligence-Based Operation - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Affected by many factors, Pakistan has long suffered from serious local terrorism threats. The country has also taken counter-terrorism as an\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Feature-Image.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Analysis of Cyber Attack of APT Organization Confucius against Pakistan&#8217;s Intelligence-Based Operation\",\"datePublished\":\"2023-01-12T02:31:17+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/\"},\"wordCount\":1351,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Feature-Image.png\",\"keywords\":[\"APT\",\"APT Group;\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/\",\"name\":\"Analysis of Cyber Attack of APT Organization Confucius against Pakistan's Intelligence-Based Operation - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Feature-Image.png\",\"datePublished\":\"2023-01-12T02:31:17+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Feature-Image.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Feature-Image.png\",\"width\":380,\"height\":184,\"caption\":\"Hacker in hoodie pointing at digital interface.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analysis of Cyber Attack of APT Organization Confucius against Pakistan&#8217;s Intelligence-Based Operation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysis of Cyber Attack of APT Organization Confucius against Pakistan's Intelligence-Based Operation - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Analysis of Cyber Attack of APT Organization Confucius against Pakistan's Intelligence-Based Operation - NSFOCUS","og_description":"Overview Affected by many factors, Pakistan has long suffered from serious local terrorism threats. The country has also taken counter-terrorism as an","og_url":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/","og_site_name":"NSFOCUS","article_published_time":"2023-01-12T02:31:17+00:00","article_modified_time":"2026-04-17T18:07:42+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Feature-Image.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Analysis of Cyber Attack of APT Organization Confucius against Pakistan's Intelligence-Based Operation - NSFOCUS","twitter_description":"Overview Affected by many factors, Pakistan has long suffered from serious local terrorism threats. The country has also taken counter-terrorism as an","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Feature-Image.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Analysis of Cyber Attack of APT Organization Confucius against Pakistan&#8217;s Intelligence-Based Operation","datePublished":"2023-01-12T02:31:17+00:00","dateModified":"2026-04-17T18:07:42+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/"},"wordCount":1351,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Feature-Image.png","keywords":["APT","APT Group;"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/","url":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/","name":"Analysis of Cyber Attack of APT Organization Confucius against Pakistan's Intelligence-Based Operation - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Feature-Image.png","datePublished":"2023-01-12T02:31:17+00:00","dateModified":"2026-04-17T18:07:42+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Feature-Image.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Feature-Image.png","width":380,"height":184,"caption":"Hacker in hoodie pointing at digital interface."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/analysis-of-cyber-attack-of-apt-organization-confucius-against-pakistans-intelligence-based-operation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Analysis of Cyber Attack of APT Organization Confucius against Pakistan&#8217;s Intelligence-Based Operation"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/22771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=22771"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/22771\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/22789"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=22771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=22771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=22771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}