Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators

Posted on December 16, 2025December 16, 2025 By CWS

A major discovery in risk intelligence reveals that APT-C-35, generally referred to as DoNot, continues to keep up an lively infrastructure footprint throughout the web.

Safety researchers have recognized new infrastructure clusters linked to this India-based risk group, which has lengthy been acknowledged as a state-sponsored actor with espionage capabilities concentrating on vital areas in South Asia.

APT-C-35 represents a persistent cybersecurity risk to organizations throughout authorities, protection, and diplomatic sectors.

The group’s operations have remained constant, with researchers documenting infrastructure actions that present how attackers preserve command-and-control channels whereas evading conventional detection strategies.

Current findings present that the group’s internet servers preserve distinct traits that may be traced and monitored by safety groups.

At-Bay analyst and researcher Idan Tarab recognized particular technical markers that distinguish APT-C-35 infrastructure from authentic internet servers.

These indicators offered the inspiration for monitoring the group’s latest actions and understanding their operational strategies throughout a number of community segments.

Infrastructure Searching and Detection Strategies

The investigation employed a structured strategy to determine APT-C-35 belongings by analyzing Apache HTTP response traits mixed with Autonomous System Quantity (ASN) 399629 evaluation.

Safety researchers found that the focused infrastructure revealed constant patterns in HTTP responses, together with particular header configurations that served as dependable detection signatures.

The searching queries revealed that servers related to APT-C-35 returned particular Apache HTTP headers, together with standardized expiration dates and content-length values.

One specific indicator recognized HTTP responses with “Expires: Thu, 19 Nov 1981 08:52:00 GMT” paired with “HTTP/1.1 200 OK” standing codes throughout ASN 399629, which considerably narrowed the search scope.

Evaluation uncovered roughly 73 outcomes representing 36 distinctive IP addresses inside the infrastructure cluster.

The first recognized server, gilbertfix.information hosted on IP 149.248.76.43 in Wyoming, confirmed typical cache management headers together with “Cache-Management: no-store, no-cache, must-revalidate” configurations.

These defensive measures recommend the infrastructure was designed to stop caching and safe delicate communications.

The invention permits safety groups to implement proactive risk detection by monitoring for these particular HTTP response patterns.

Organizations can now correlate community indicators of compromise with recognized APT-C-35 infrastructure, accelerating incident response occasions and bettering risk characterization accuracy.

This analysis reinforces the significance of steady infrastructure searching in sustaining operational consciousness towards state-sponsored risk actors.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Activity, Apache, APTC35, HTTP, Indicators, Infrastructure, Leveraged, Response

Post navigation

Previous Post: Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure

Related Posts

Hackers Exploited 73 0-Day Vulnerabilities and Earned $1,024,750 Cyber Security News
UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled Cyber Security News
ConnectWise Hacked – Nation State Actors Compromised the Systems to Access Customer Data Cyber Security News
Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware Cyber Security News
Authorities Seized Thousands of Servers from Rogue Hosting Company Used to Fuel Cyberattacks Cyber Security News
BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes
  • From Open Source to OpenAI: The Evolution of Third-Party Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes
  • From Open Source to OpenAI: The Evolution of Third-Party Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark