• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
apt hackers targeting industrial control systems with shadowpad backdoor

APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor

You are here: Home / General Cyber Security News / APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor
June 28, 2022

Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack marketing campaign that targets unpatched Microsoft Trade Servers as an first obtain vector to deploy the ShadowPad malware.

Russian cybersecurity company Kaspersky, which first detected the action in mid-October 2021, attributed it to a earlier unknown Chinese-talking menace actor. Targets include things like companies in the telecommunications, manufacturing, and transportation sectors.

“For the duration of the original attacks, the group exploited an MS Exchange vulnerability to deploy ShadowPad malware and infiltrated making automation units of just one of the victims,” the organization mentioned. “By having regulate over all those methods, the attacker can arrive at other, even a lot more delicate methods of the attacked firm.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


ShadowPad, which emerged in 2015 as the successor to PlugX, is a privately sold modular malware platform that has been set to use by numerous Chinese espionage actors in excess of the years.

Though its style and design enables customers to remotely deploy more plugins that can prolong its features beyond covert knowledge selection, what makes ShadowPad hazardous is the anti-forensic and anti-investigation system incorporated into the malware.

“Throughout the attacks of the noticed actor, the ShadowPad backdoor was downloaded onto the attacked personal computers beneath the guise of legitimate software program,” Kaspersky said. “In quite a few instances, the attacking team exploited a recognised vulnerability in MS Exchange, and entered the commands manually, indicating the remarkably qualified character of their strategies.”

CyberSecurity

Proof implies that intrusions mounted by the adversary started in March 2021, correct all-around the time the ProxyLogon vulnerabilities in Exchange Servers grew to become community awareness. Some of the targets are reported to have been breached by exploiting CVE-2021-26855, a server-aspect request forgery (SSRF) vulnerability in the mail server.

Aside from deploying ShadowPad as “mscoree.dll,” an genuine Microsoft .NET Framework element, the attacks also concerned the use of Cobalt Strike, a PlugX variant called THOR, and web shells for remote entry.

While the closing ambitions of the marketing campaign keep on being unknown, the attackers are thought to be interested in very long-expression intelligence collecting.

“Setting up automation methods are unusual targets for state-of-the-art threat actors,” Kaspersky ICS CERT researcher Kirill Kruglov explained. “Nevertheless, those people techniques can be a worthwhile resource of highly private information and may deliver the attackers with a backdoor to other, extra secured, spots of infrastructures.”

Discovered this write-up interesting? Comply with THN on Facebook, Twitter  and LinkedIn to read a lot more exclusive information we submit.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «Cyber Security News 97% Of UK Business Leaders Expect Quantum Computing to Disrupt Their Sectors
Next Post: Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data log4shell vulnerability targeted in vmware servers to exfiltrate data»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.