• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

China-Based Hackers Target Southeast Asia With USB-Based Malware

You are here: Home / General Cyber Security News / China-Based Hackers Target Southeast Asia With USB-Based Malware
November 30, 2022

Cyber espionage exercise relying on USB equipment as an first infection vector has been noticed focusing on community and personal entities in Southeast Asia and the Philippines in certain.

Cybersecurity professionals at Mandiant shared their conclusions about the new strategies on Monday, attributing them to a China-primarily based threat actor they contact UNC4191.

In accordance to the technical publish-up, UNC4191 functions have affected a number of entities in Southeast Asia but also in the US, Europe and Asia Pacific Japan.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“However, even when targeted companies were being dependent in other locations, the particular programs qualified by UNC4191 were also uncovered to be physically found in the Philippines,” Mandiant wrote.

In terms of attack method, subsequent preliminary an infection by means of USB gadgets, the risk actor leveraged legitimately signed binaries to aspect-load malware, which include a few new family members Mandiant named Mistcloak, Darkdew and Bluehaze.

The very first of the three malware items is responsible for equally facet-loading a malicious file that impersonates a genuine dynamic link library (DLL) and for launching an encrypted file. The next section of the attack consists of Darkdew, an encrypted DLL payload that can infect removable drives to enable self-propagation. Finally, Bluehaze executes to reach program persistence.

“Successful compromise led to the deployment of a renamed NCAT binary and execution of a reverse shell on the victim’s program, offering backdoor access to the danger actor,” the security researchers stated.

“The malware self-replicates by infecting new detachable drives that are plugged into a compromised technique, allowing the destructive payloads to propagate to supplemental systems and possibly obtain details from air-gapped units.”

Mandiant additional that based on gathered info, the UNC4191 campaign potentially extends again to September 2021.

“We believe that this action showcases Chinese operations to achieve and keep access to community and private entities for the functions of intelligence selection associated to China’s political and commercial interests,” the organization wrote.

“Our observations advise that entities in the Philippines are the most important target of this procedure based on the variety of affected devices found in this place that had been discovered by Mandiant.”

The advisory comes months soon after menace actor Luckymouse was spotted applying a trojanized model of the cross-system messaging app MiMi to backdoor devices in the Philippines and Taiwan.


Some elements of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Zero-Day Flaw Discovered in Quarkus Java Framework
Next Post: How to elevate cyber security needs to be a board-level issue how to elevate cyber security needs to be a board level»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.