{"id":22804,"date":"2023-01-12T09:23:29","date_gmt":"2023-01-12T09:23:29","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=22804"},"modified":"2026-04-17T18:07:42","modified_gmt":"2026-04-17T18:07:42","slug":"bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/","title":{"rendered":"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><\/p>\n\n\n\n<p>From December 19, 2022 to Jan 1, 2023, NSFOCUS Security Labs found activity clues of 61 APT groups, 3 malware families (Zbot botnet, SpicyHotPot Trojan, and Banload Trojan), and 490 threat actors targeting critical infrastructure.<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-black-color has-text-color has-background wp-block-heading\" style=\"background-color:#f2f0f0\"><strong>APT Groups<\/strong><\/h2>\n\n\n\n<p>Among the 61 APT groups discovered, the APT28 affected the most significant number of hosts from December 19 to Jan 1, 2023.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"417\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture1-1024x417.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22805\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture1-1024x417.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture1-300x122.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture1-768x313.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture1-600x244.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture1-200x81.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture1.png 1359w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Number of hosts affected by APT groups from December 19, 2022 through Jan 1, 2023<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture2.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture2.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22807\" width=\"679\" height=\"396\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Industries affected by APT groups from December 19, 2022 through Jan 1, 2023<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-black-color has-text-color has-background wp-block-heading\" style=\"background-color:#f3f0f0\"><strong>Threat Actors Targeting Critical Infrastructure<\/strong><\/h2>\n\n\n\n<p>A total of 490 threat actors targeting critical infrastructure remained active in this period.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture3.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture3.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22809\" width=\"794\" height=\"383\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture3.png 974w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture3-300x145.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture3-768x371.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture3-600x290.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture3-200x97.png 200w\" sizes=\"(max-width: 794px) 100vw, 794px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Distribution of activities by activity type from December 19, 2022 through Jan 1, 2023<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture4.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture4.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22811\" width=\"753\" height=\"396\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture4.png 924w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture4-300x158.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture4-768x405.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture4-600x316.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture4-200x105.png 200w\" sizes=\"(max-width: 753px) 100vw, 753px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Number of threat actors by target industry from December 19, 2022 through Jan 1, 2023<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-black-color has-text-color has-background wp-block-heading\" style=\"background-color:#f2f0f0\"><strong>Knowledge Graphs of Highlighted APT Groups<\/strong><\/h2>\n\n\n\n<p class=\"has-text-color\" style=\"color:#009ac6\"><strong>APT28<\/strong><\/p>\n\n\n\n<p><strong>First Discovery Time:<\/strong> 2020-11-13 07:38:40<br><strong>Description:<\/strong> APT28 is a famous cyber espionage group. Some researchers believe this organization belongs to the GRU of the Russian Federation. APT 28 is also known as Sofacy Group and STRONTIUM, and its main targets are aviation, national defense, government agencies and international organizations.<br><strong>Geolocation of Threat Actor:<\/strong> Russia<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture5.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture5.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22813\" width=\"475\" height=\"302\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture5.png 401w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture5-300x191.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture5-200x127.png 200w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Diamond model of APT28<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#009ac6\"><strong>NoName057 (16)<\/strong><\/p>\n\n\n\n<p><strong>First Discovery Time:<\/strong> 2022-09-16 07:49:06<br><strong>Description:<\/strong> NoName057 (16) hackers are carrying out DDoS attacks on the websites of Ukrainian government agencies, news agencies, military, suppliers, telecommunications companies, transport authorities, financial institutions and other organizations, as well as neighboring countries supporting Ukraine (such as Estonia, Lithuania, and Norway). NoName057 (16) is a pro-Russian hacker organization. They showed off their attack cases on Telegram channel, which has more than 14000 subscribers. After successfully attacking the Finnish and Polish parliaments, the organization was exposed in the media in early August 2022.<br><strong>Geolocation of Threat Actor:<\/strong> Russia<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture6.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture6.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22815\" width=\"468\" height=\"324\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture6.png 669w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture6-300x208.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture6-600x415.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture6-200x138.png 200w\" sizes=\"(max-width: 468px) 100vw, 468px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Diamond model of APT Group NoName057 (16)<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#009ac6\"><strong>MK-CC-21<\/strong><\/p>\n\n\n\n<p><strong>First Discovery Time:<\/strong> 2022-05-19 11:49:38<br><strong>Description:<\/strong> MK-CC-21 is an APT group based in the United States. This group uses Cobalt Strike as the attack tool.<br><strong>Geolocation of Threat Actor:<\/strong> United States of America (USA)<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture7.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture7.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-22817\" width=\"470\" height=\"300\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture7.png 663w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture7-300x191.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture7-600x383.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/01\/Picture7-200x128.png 200w\" sizes=\"(max-width: 470px) 100vw, 470px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Diamond model of APT Group MK-CC-21<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-background\" style=\"background-color:#f2f0f0\"><strong>About NSFOCUS Security Labs<\/strong><\/p>\n\n\n\n<p>NSFOCUS Security Labs (NSL) is an internationally-recognized cybersecurity research and threat response center at the forefront of vulnerability assessment, threat hunting and mitigation research.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>From December 19, 2022 to Jan 1, 2023, NSFOCUS Security Labs found activity clues of 61 APT groups, 3 malware families (Zbot botnet, SpicyHotPot Trojan, and Banload Trojan), and 490 threat actors targeting critical infrastructure. APT Groups Among the 61 APT groups discovered, the APT28 affected the most significant number of hosts from December 19 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":22425,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[93,94],"class_list":["post-22804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-apt","tag-apt-group"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023) - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"From December 19, 2022 to Jan 1, 2023, NSFOCUS Security Labs found activity clues of 61 APT groups, 3 malware families (Zbot botnet, SpicyHotPot Trojan,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-12T09:23:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/12\/breadcrumbs.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"From December 19, 2022 to Jan 1, 2023, NSFOCUS Security Labs found activity clues of 61 APT groups, 3 malware families (Zbot botnet, SpicyHotPot Trojan,\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/12\/breadcrumbs.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023)\",\"datePublished\":\"2023-01-12T09:23:29+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/\"},\"wordCount\":343,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/breadcrumbs.png\",\"keywords\":[\"APT\",\"APT Group;\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/\",\"name\":\"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/breadcrumbs.png\",\"datePublished\":\"2023-01-12T09:23:29+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/breadcrumbs.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/breadcrumbs.png\",\"width\":399,\"height\":241,\"caption\":\"Breadcrumb trail on a dirt path.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023) - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023) - NSFOCUS","og_description":"From December 19, 2022 to Jan 1, 2023, NSFOCUS Security Labs found activity clues of 61 APT groups, 3 malware families (Zbot botnet, SpicyHotPot Trojan,","og_url":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/","og_site_name":"NSFOCUS","article_published_time":"2023-01-12T09:23:29+00:00","article_modified_time":"2026-04-17T18:07:42+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/12\/breadcrumbs.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023) - NSFOCUS","twitter_description":"From December 19, 2022 to Jan 1, 2023, NSFOCUS Security Labs found activity clues of 61 APT groups, 3 malware families (Zbot botnet, SpicyHotPot Trojan,","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/12\/breadcrumbs.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023)","datePublished":"2023-01-12T09:23:29+00:00","dateModified":"2026-04-17T18:07:42+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/"},"wordCount":343,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/12\/breadcrumbs.png","keywords":["APT","APT Group;"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/","url":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/","name":"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/12\/breadcrumbs.png","datePublished":"2023-01-12T09:23:29+00:00","dateModified":"2026-04-17T18:07:42+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/12\/breadcrumbs.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/12\/breadcrumbs.png","width":399,"height":241,"caption":"Breadcrumb trail on a dirt path."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/bread-crumbs-of-threat-actors-dec-19-2022-jan-1-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Bread Crumbs of Threat Actors (Dec 19, 2022 \u2013 Jan 1, 2023)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/22804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=22804"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/22804\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/22425"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=22804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=22804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=22804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}