• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
chinese hackers caught exploiting popular antivirus products to target telecom

Chinese Hackers Caught Exploiting Popular Antivirus Products to Target Telecom Sector

You are here: Home / General Cyber Security News / Chinese Hackers Caught Exploiting Popular Antivirus Products to Target Telecom Sector
May 3, 2022

A Chinese-aligned cyberespionage group has been noticed striking the telecommunication sector in Central Asia with versions of malware these kinds of as ShadowPad and PlugX.

Cybersecurity company SentinelOne tied the intrusions to an actor it tracks under the title “Moshen Dragon,” with tactical overlaps in between the collective and yet another threat group referred to as Nomad Panda (aka RedFoxtrot).

“PlugX and ShadowPad have a very well-founded history of use amid Chinese-talking risk actors primarily for espionage activity,” SentinelOne’s Joey Chen stated. “Those people tools have flexible, modular features and are compiled by way of shellcode to very easily bypass conventional endpoint defense merchandise.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


ShadowPad, labeled a “masterpiece of privately bought malware in Chinese espionage,” emerged as a successor to PlugX in 2015, even as variants of the latter have continuously popped up as section of unique campaigns linked with Chinese threat actors.

Whilst regarded to be deployed by the government-sponsored hacking group dubbed Bronze Atlas (aka APT41, Barium, or Winnti) given that at least 2017, an at any time-escalating variety of other China-joined risk actors have joined the fray.

Chinese Hackers

Before this yr, Secureworks attributed unique ShadowPad exercise clusters to Chinese nation-state teams that function in alignment with the Chinese Ministry of Point out Security (MSS) civilian intelligence company and the People’s Liberation Army (PLA).

The most up-to-date results from SentinelOne dovetails with a past report from Trellix in late March that disclosed a RedFoxtrot attack marketing campaign concentrating on telecom and protection sectors in South Asia with a new variant of PlugX malware named Talisman.

CyberSecurity

Moshen Dragon’s TTPs entail the abuse of authentic antivirus computer software belonging to BitDefender, Kaspersky, McAfee, Symantec, and Pattern Micro to sideload ShadowPad and Talisman on compromised devices by indicates of a approach termed DLL lookup purchase hijacking.

In the subsequent step, the hijacked DLL is applied to decrypt and load the closing ShadowPad or PlugX payload that resides in the exact same folder as that of the antivirus executable. Persistence is reached by either developing a scheduled process or a provider.

The hijacking of security goods notwithstanding, other strategies adopted by the group include things like the use of known hacking tools and crimson staff scripts to aid credential theft, lateral movement and info exfiltration. The first access vector continues to be unclear as nonetheless.

“As soon as the attackers have set up a foothold in an business, they move forward with lateral movement by leveraging Impacket inside of the network, placing a passive backdoor into the victim surroundings, harvesting as several qualifications as feasible to insure unlimited access, and concentrating on details exfiltration,” Chen stated.

Observed this posting fascinating? Stick to THN on Facebook, Twitter  and LinkedIn to study additional unique information we submit.


Some components of this short article are sourced from:
thehackernews.com

Previous Post: «unpatched dns related vulnerability affects a wide range of iot Unpatched DNS Related Vulnerability Affects a Wide Range of IoT Devices
Next Post: AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection avoslocker ransomware variant using new trick to disable antivirus protection»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message
  • Ransomware Attacks Increasing at “Alarming” Rate
  • Senate Report: US Government Lacks Comprehensive Data on Ransomware
  • Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys
  • Fronton IOT Botnet Packs Disinformation Punch
  • SIM-based Authentication Aims to Transform Device Binding Security to End Phishing
  • New Chaos Ransomware Builder Variant “Yashma” Discovered in the Wild
  • Open source packages with millions of installs hacked to harvest AWS credentials
  • DOE ‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌funds‌ ‌development of Qunnect’s Quantum Repeater
  • Cabinet Office Reports 800 Missing Electronic Devices in Three Years

Copyright © TheCyberSecurity.News, All Rights Reserved.