Cyber espionage by Chinese hackers in neighbouring nations is on the rise

Technology

A string of cyber espionage campaigns dating all the way back to 2014 and focused on gathering military intelligence from neighbouring countries have been linked to a Chinese military-intelligence apparatus.

In a wide-ranging report published by Massachusetts-headquartered Recorded Future this week, the cybersecurity firm’s Insikt Group said it identified ties between a group it tracks as “RedFoxtrot” to the People’s Liberation Army (PLA) Unit 69010 operating out of Ürümqi, the capital of the Xinjiang Uyghur Autonomous Region in the country.

Stack Overflow Teams

Previously called the Lanzhou Military Region’s Second Technical Reconnaissance Bureau, Unit 69010 is a military cover for a Technical Reconnaissance Bureau (TRB) within China’s Strategic Support Force (SSF) Network Systems Department (NSD).

The connection to PLA Unit 69010 stems from what the researchers said were “lax operational security measures” adopted by an unnamed suspected RedFoxtrot threat actor, whose online persona disclosed the physical address of the reconnaissance bureau and has had a history of affiliating with the PLA’s former Communications Command Academy in Wuhan.

RedFoxtrot is noted to target government, defense, and telecommunications sectors across Central Asia, India, and Pakistan, with intrusions in the last six months directed against three Indian aerospace and defense contractors as well as major telecommunications providers and government agencies in Afghanistan, India, Kazakhstan, and Pakistan.

Prevent Data Breaches

“Activity over this period showed a particular focus on Indian targets, which occurred at a time of heightened border tensions between India and the People’s Republic of China,” the researchers said.

Attacks staged by the adversary involved an assortment of open- and closed-source tools that have been shared across Chinese cyberespionage groups, including PlugX, Royal Road RTF weaponizer, QUICKHEAL, PCShare, IceFog, and Poison Ivy RAT.

Also observed is the use of AXIOMATICASYMPTOTE infrastructure, which encompasses a modular Windows backdoor called ShadowPad that has been previously attributed to APT41 and subsequently shared between other Chinese state-backed actors.

Furthermore, domains registered by RedFoxtrot — “inbsnl.ddns[.]info” and “adtl.mywire[.]org” — suggest that the threat actor may have set its sights on Indian telecom service provider Bharat Sanchar Nigam Limited (BSNL) and a Bengaluru-based company called Alpha Design Technologies Limited (ADTL) that specializes in research and development of missile, radar, and satellite systems.

The development comes more than three months after another China-linked threat group, dubbed RedEcho, was uncovered targeting India’s power grid, including a power plant run by National Thermal Power Corporation (NTPC) Limited and New Delhi-based Power System Operation Corporation Limited.

Products You May Like

Articles You May Like

Shohei Ohtani Day to be annual event in LA for Dodgers star – NBC Los Angeles
Roger Corman, Trailblazing B-Movie Director and Producer, Dead at 98
The 25 Best Prime Video Original Series, Ranked
Days of Our Lives Spoilers for the Week of 5-13-24: FINALLY Some Movement on Who Killed Li Shin, But Now Maggie’s Story Is Missing
Will Trent Season 2 Episode 9 Spoilers: Will’s Trip to Puerto Rico Brings More Questions