Over a dozen military-industrial complex enterprises and public institutions in Afghanistan and Europe have come under a wave of targeted attacks since January 2022 to steal confidential data by simultaneously making use of six different backdoors.

Russian cybersecurity firm Kaspersky attributed the attacks “with a high degree of confidence” to a China-linked threat actor tracked by Proofpoint as TA428, citing overlaps in tactics, techniques, and procedures (TTPs).

TA428, also tracked under the names Bronze Dudley, Temp.Hex, and Vicious Panda, has a history of striking entities in Ukraine, Russia, Belarus, and Mongolia. It’s believed to share connections with another hacking group called Mustang Panda (aka Bronze President).

CyberSecurity

Targets of the latest cyber espionage campaign included industrial plants, design bureaus and research institutes, government agencies, ministries and departments in several East European countries and Afghanistan.

Attack chains entail penetrating the enterprise IT networks using carefully crafted phishing emails, including some that referenced non-public information pertaining to the organizations, to trick recipients into opening rogue Microsoft Word documents.

Chinese Hackers

These decoy files come with exploits for a 2017 memory corruption flaw in the Equation Editor component (CVE-2017-11882) that could lead to the execution of arbitrary code in the affected systems, ultimately leading to the deployment of a backdoor called PortDoor.

PortDoor was notably employed in spear-phishing attacks mounted by Chinese state-sponsored hackers in April 2021 to hack into the systems of a defense contractor that designs submarines for the Russian Navy.

Chinese Hackers

The use of six different implants is likely an attempt on the part of the threat actors to establish redundant channels for controlling infected hosts should one of them get detected and removed from the networks.

The intrusions culminate with the attacker hijacking the domain controller and gaining complete control of all of the organization’s workstations and servers, leveraging the privileged access to exfiltrate files of interest in the form of compressed ZIP archives to a remote server located in China.

CyberSecurity

Other backdoors utilized in the attacks include nccTrojan, Cotx, DNSep, Logtu, and a previously undocumented malware dubbed as CotSam, so named owing to its similarities with Cotx. Each provides extensive functionality for commandeering the systems and harvesting sensitive data.

Also incorporated in the attacks is Ladon, a hacking framework for the lateral movement that also enables the adversary to scan for devices in the network as well as exploit security vulnerabilities in them to execute malicious code.

“Spear phishing remains one of the most relevant threats to industrial enterprises and public institutions,” Kaspersky said. “The attackers used primarily known backdoor malware, as well as standard techniques for lateral movement and antivirus solution evasion.”

“At the same time, they were able to penetrate dozens of enterprises and even take control of the entire IT infrastructure, and IT security solutions of some of the organizations attacked.”

The findings arrive a little over two months after the Twisted Panda actors were observed targeting research institutes in Russia and Belarus to drop a bare-bones backdoor called Spinner.

Technology

Products You May Like

Articles You May Like

Blackpink Scores Historic Win With ‘Born Pink’ Album Release
Infinix Zero Ultra 5G Launch Set for October 5, Alleged Live Images Tip 200-Megapixel Main Camera
Aaron Judge Ties the Real Home Run Record
The Northern Boys, Rapping Retired U.K. Teachers, Break Down Their Filthy Viral Hit ‘Party Time’
Johnny Depp and Attorney Joelle Rich Dating During U.S. Heard Trial

Leave a Reply

Your email address will not be published.