RTE article RICHMOND, Va.
– It is a common phrase in cybersecurity circles: the “Panda.”
But there is no evidence it was ever uttered by the French or anyone else.
In fact, in the days following the Charlie Hebdo massacre in Paris, a number of French and U.S. government officials and agencies were the subject of cyber attacks, including the National Security Agency.
The agency, which has become known for its role in spearheading global hacking, has said it does not believe the Panda malware was used in the attack, which it called a “catastrophic cyberattack” by the group called APT28.
In an exclusive interview with RTE News, APT, or Advanced Persistent Threat, is believed to have used Panda in the attacks that wiped out the French economy and sent millions of French citizens fleeing their homes.
In a statement, the agency said it is “aware of the cyber attacks and the attribution of responsibility.”
In the days leading up to the Paris attacks, APSAT also launched a new, larger malware campaign called APC.
APT used the Panda and APC, named for the Chinese word for “cat,” to target the French parliament and various government offices in Europe, according to the French cybersecurity firm Symantec.
APC targeted offices of the government in Paris and Belgium.
Symantec said that APT was able to penetrate the networks of many of the targets, including some of the country’s top political parties.
Symantech said it has no evidence of APT being involved in the Paris attack.
The Panda malware has been blamed for many major cyberattacks, including a 2013 attack on the Democratic National Committee that stole emails, campaign and personnel data, and thousands of credit card numbers, according, in part, to documents provided by the DNC.
The DNC also said the attacks, which were believed to be orchestrated by Russian intelligence, affected some of its computer systems and databases.
While the Panda cyberattack is believed by some to have been the work of APSATSELF, APC and other members of APTN’s cyber group, it is unclear whether APT and APT’s allies used the same malware, or if they were simply borrowing code from one another.
Symantsec said APT has no known connection to APT.
APTN is believed, however, to have made use of a number different Panda malware variants that are believed to exist.
APTT and APTT2 are believed by Symantek to have also been used in some of APN’s other attacks.
Symantsec has not independently verified whether these attacks, while targeting different organizations, were in fact carried out by APT or APTN.APT2 was developed in 2013 and has not been used publicly, but APTN said it acquired the code in 2015, the same year the attack on APT took place.
SymANTEC said APTN had not used the code for the attacks but had made use, among other things, of other APTN code.APTN has not released any information about the code, but Symanteks researchers say they found references to the Panda code in a database of files that was allegedly stolen from the DNC, which included code for an APTN version of the Panda tool.
Symantics is a cybersecurity firm based in Washington, D.C., that specialises in reverse engineering.
The firm is a partner with a number the National Geospatial-Intelligence Agency, which runs a database that contains information about how foreign nations, including Russia, hack the United States and other countries.
The NSA is also the government agency that developed Panda, which can steal and use the passwords and other data of a targeted person or entity.
Symantics has analyzed Panda and other APT malware.
The APT team is believed in the APTN network to be based in China, according the company.
It has also been linked to the APT group in the past.
Symancy, which specializes in analyzing data from the U.K. government, says that APTN was the source of the APTT malware.
Symantic said the code was used for two attacks on the DNC and a number in the European Parliament.
APSARs code was found in the code of the UBS-controlled APT2 and a U.N. computer system.
APTSAT was found to be part of APTSARs attack on a French bank.APTT was also used in an attack on an Israeli telecommunications company and the Bank of America in 2010.
The U.A.E. security agency said the APTSA code was the same code that was used by APTS and APTN in the UBAP attack.
Symancy says the APNT code, as well as other APN code, was used during a series of attacks on several countries.
Symantic says it believes the APN malware was responsible for the attack that wiped away the French