Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators

Posted on December 16, 2025December 16, 2025 By CWS

A major discovery in risk intelligence reveals that APT-C-35, generally referred to as DoNot, continues to keep up an lively infrastructure footprint throughout the web.

Safety researchers have recognized new infrastructure clusters linked to this India-based risk group, which has lengthy been acknowledged as a state-sponsored actor with espionage capabilities concentrating on vital areas in South Asia.

APT-C-35 represents a persistent cybersecurity risk to organizations throughout authorities, protection, and diplomatic sectors.

The group’s operations have remained constant, with researchers documenting infrastructure actions that present how attackers preserve command-and-control channels whereas evading conventional detection strategies.

Current findings present that the group’s internet servers preserve distinct traits that may be traced and monitored by safety groups.

At-Bay analyst and researcher Idan Tarab recognized particular technical markers that distinguish APT-C-35 infrastructure from authentic internet servers.

These indicators offered the inspiration for monitoring the group’s latest actions and understanding their operational strategies throughout a number of community segments.

Infrastructure Searching and Detection Strategies

The investigation employed a structured strategy to determine APT-C-35 belongings by analyzing Apache HTTP response traits mixed with Autonomous System Quantity (ASN) 399629 evaluation.

Safety researchers found that the focused infrastructure revealed constant patterns in HTTP responses, together with particular header configurations that served as dependable detection signatures.

The searching queries revealed that servers related to APT-C-35 returned particular Apache HTTP headers, together with standardized expiration dates and content-length values.

One specific indicator recognized HTTP responses with “Expires: Thu, 19 Nov 1981 08:52:00 GMT” paired with “HTTP/1.1 200 OK” standing codes throughout ASN 399629, which considerably narrowed the search scope.

Evaluation uncovered roughly 73 outcomes representing 36 distinctive IP addresses inside the infrastructure cluster.

The first recognized server, gilbertfix.information hosted on IP 149.248.76.43 in Wyoming, confirmed typical cache management headers together with “Cache-Management: no-store, no-cache, must-revalidate” configurations.

These defensive measures recommend the infrastructure was designed to stop caching and safe delicate communications.

The invention permits safety groups to implement proactive risk detection by monitoring for these particular HTTP response patterns.

Organizations can now correlate community indicators of compromise with recognized APT-C-35 infrastructure, accelerating incident response occasions and bettering risk characterization accuracy.

This analysis reinforces the significance of steady infrastructure searching in sustaining operational consciousness towards state-sponsored risk actors.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Activity, Apache, APTC35, HTTP, Indicators, Infrastructure, Leveraged, Response

Post navigation

Previous Post: Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
Next Post: Dux Emerges From Stealth Mode With $9 Million in Funding

Related Posts

Top 20 Most Exploited Vulnerabilities of 2025 Cyber Security News
CrowdStrike Falcon Windows Sensor Vulnerability Let Attackers Execute Code and Delete Files on Host Cyber Security News
New Phishing Attack Uses Basic Auth URLs to Trick Users and Steal Login Credentials Cyber Security News
Microsoft VS Code Remote-SSH Extension Hacked to Execute Malicious Code on Developer’s Machine Cyber Security News
Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails Cyber Security News
Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys
  • eScan Antivirus Delivers Malware in Supply Chain Attack
  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
  • Automated Penetration Testing Toolkit Designed for Linux systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark