Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators

Posted on December 16, 2025December 16, 2025 By CWS

A major discovery in risk intelligence reveals that APT-C-35, generally referred to as DoNot, continues to keep up an lively infrastructure footprint throughout the web.

Safety researchers have recognized new infrastructure clusters linked to this India-based risk group, which has lengthy been acknowledged as a state-sponsored actor with espionage capabilities concentrating on vital areas in South Asia.

APT-C-35 represents a persistent cybersecurity risk to organizations throughout authorities, protection, and diplomatic sectors.

The group’s operations have remained constant, with researchers documenting infrastructure actions that present how attackers preserve command-and-control channels whereas evading conventional detection strategies.

Current findings present that the group’s internet servers preserve distinct traits that may be traced and monitored by safety groups.

At-Bay analyst and researcher Idan Tarab recognized particular technical markers that distinguish APT-C-35 infrastructure from authentic internet servers.

These indicators offered the inspiration for monitoring the group’s latest actions and understanding their operational strategies throughout a number of community segments.

Infrastructure Searching and Detection Strategies

The investigation employed a structured strategy to determine APT-C-35 belongings by analyzing Apache HTTP response traits mixed with Autonomous System Quantity (ASN) 399629 evaluation.

Safety researchers found that the focused infrastructure revealed constant patterns in HTTP responses, together with particular header configurations that served as dependable detection signatures.

The searching queries revealed that servers related to APT-C-35 returned particular Apache HTTP headers, together with standardized expiration dates and content-length values.

One specific indicator recognized HTTP responses with “Expires: Thu, 19 Nov 1981 08:52:00 GMT” paired with “HTTP/1.1 200 OK” standing codes throughout ASN 399629, which considerably narrowed the search scope.

Evaluation uncovered roughly 73 outcomes representing 36 distinctive IP addresses inside the infrastructure cluster.

The first recognized server, gilbertfix.information hosted on IP 149.248.76.43 in Wyoming, confirmed typical cache management headers together with “Cache-Management: no-store, no-cache, must-revalidate” configurations.

These defensive measures recommend the infrastructure was designed to stop caching and safe delicate communications.

The invention permits safety groups to implement proactive risk detection by monitoring for these particular HTTP response patterns.

Organizations can now correlate community indicators of compromise with recognized APT-C-35 infrastructure, accelerating incident response occasions and bettering risk characterization accuracy.

This analysis reinforces the significance of steady infrastructure searching in sustaining operational consciousness towards state-sponsored risk actors.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Activity, Apache, APTC35, HTTP, Indicators, Infrastructure, Leveraged, Response

Post navigation

Previous Post: Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
Next Post: Dux Emerges From Stealth Mode With $9 Million in Funding

Related Posts

Hackers Reportedly Demand Google Fire Two Employees, Threaten Data Leak Cyber Security News
Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS Cyber Security News
APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails Cyber Security News
Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence Cyber Security News
Critical SonicWall SSL VPN Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure
  • Chinese Based Ink Dragon Compromises Asia and South America into European Government Networks
  • The Case for Dynamic AI-SaaS Security as Copilots Scale
  • 113,000 Impacted by Data Breach at Virginia Mental Health Authority
  • IoT Security Firm Exein Raises €100 Million

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure
  • Chinese Based Ink Dragon Compromises Asia and South America into European Government Networks
  • The Case for Dynamic AI-SaaS Security as Copilots Scale
  • 113,000 Impacted by Data Breach at Virginia Mental Health Authority
  • IoT Security Firm Exein Raises €100 Million

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark