Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators

Posted on December 16, 2025December 16, 2025 By CWS

A major discovery in risk intelligence reveals that APT-C-35, generally referred to as DoNot, continues to keep up an lively infrastructure footprint throughout the web.

Safety researchers have recognized new infrastructure clusters linked to this India-based risk group, which has lengthy been acknowledged as a state-sponsored actor with espionage capabilities concentrating on vital areas in South Asia.

APT-C-35 represents a persistent cybersecurity risk to organizations throughout authorities, protection, and diplomatic sectors.

The group’s operations have remained constant, with researchers documenting infrastructure actions that present how attackers preserve command-and-control channels whereas evading conventional detection strategies.

Current findings present that the group’s internet servers preserve distinct traits that may be traced and monitored by safety groups.

At-Bay analyst and researcher Idan Tarab recognized particular technical markers that distinguish APT-C-35 infrastructure from authentic internet servers.

These indicators offered the inspiration for monitoring the group’s latest actions and understanding their operational strategies throughout a number of community segments.

Infrastructure Searching and Detection Strategies

The investigation employed a structured strategy to determine APT-C-35 belongings by analyzing Apache HTTP response traits mixed with Autonomous System Quantity (ASN) 399629 evaluation.

Safety researchers found that the focused infrastructure revealed constant patterns in HTTP responses, together with particular header configurations that served as dependable detection signatures.

The searching queries revealed that servers related to APT-C-35 returned particular Apache HTTP headers, together with standardized expiration dates and content-length values.

One specific indicator recognized HTTP responses with “Expires: Thu, 19 Nov 1981 08:52:00 GMT” paired with “HTTP/1.1 200 OK” standing codes throughout ASN 399629, which considerably narrowed the search scope.

Evaluation uncovered roughly 73 outcomes representing 36 distinctive IP addresses inside the infrastructure cluster.

The first recognized server, gilbertfix.information hosted on IP 149.248.76.43 in Wyoming, confirmed typical cache management headers together with “Cache-Management: no-store, no-cache, must-revalidate” configurations.

These defensive measures recommend the infrastructure was designed to stop caching and safe delicate communications.

The invention permits safety groups to implement proactive risk detection by monitoring for these particular HTTP response patterns.

Organizations can now correlate community indicators of compromise with recognized APT-C-35 infrastructure, accelerating incident response occasions and bettering risk characterization accuracy.

This analysis reinforces the significance of steady infrastructure searching in sustaining operational consciousness towards state-sponsored risk actors.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Activity, Apache, APTC35, HTTP, Indicators, Infrastructure, Leveraged, Response

Post navigation

Previous Post: Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
Next Post: Dux Emerges From Stealth Mode With $9 Million in Funding

Related Posts

K2 Think AI Model Jailbroken Within Hours After The Release Cyber Security News
5 New Trends In Phishing Attacks On Businesses  Cyber Security News
Hackers Compromise Intelligence Website Used by CIA and Other Agencies Cyber Security News
Hackers Using PuTTY for Both Lateral Movement and Data Exfiltration Cyber Security News
Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects Cyber Security News
TAG-150 Hackers Deploying Self-Developed Malware Families to Attack Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers
  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers
  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark