• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
chinese hackers using mgbot malware to target international ngos in

Chinese Hackers Using MgBot Malware to Target International NGOs in Mainland China

You are here: Home / General Cyber Security News / Chinese Hackers Using MgBot Malware to Target International NGOs in Mainland China
April 26, 2023

The sophisticated persistent threat (APT) team referred to as Evasive Panda has been observed focusing on an global non-governmental business (NGO) in Mainland China with malware shipped by way of update channels of legit programs like Tencent QQ.

The attack chains are developed to distribute a Windows installer for MgBot malware, ESET security researcher Facundo Muñoz reported in a new report revealed today. The exercise commenced in November 2020 and continued in the course of 2021.

Evasive Panda, also known as Bronze Highland and Daggerfly, is a Chinese-speaking APT team that has been attributed to a collection of cyber espionage attacks focusing on several entities in China, Hong Kong, and other nations around the world located in East and South Asia because at the very least late December 2012.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The group’s hallmark is the use of the customized MgBot modular malware framework, which is able of obtaining supplemental elements on the fly to expand on its intelligence-collecting capabilities.

Some of the prominent abilities of the malware include things like stealing files, logging keystrokes, harvesting clipboard facts, recording audio streams, and credential theft from web browsers.

ESET, which learned the marketing campaign in January 2022 following a reputable Chinese application was applied to deploy an installer for the MgBot backdoor, stated the qualified people ended up located in the Gansu, Guangdong, and Jiangsu provinces and are members of an unnamed global NGO.

The trojanized application is the Tencent QQ Windows client software package updater (“QQUrlMgr.exe”) hosted on the area “update.browser.qq[.]com.” It can be not instantly distinct how the danger actor managed to deliver the implant via genuine updates.

MgBot Malware

But it points to either of the two eventualities, a source chain compromise of Tencent QQ’s update servers or a circumstance of an adversary-in-the-center (AitM) attack, as comprehensive by Kaspersky in June 2022 involving a Chinese hacking crew dubbed LuoYu.

In the latest a long time, many software package supply chain attack has been orchestrated by country-state teams from Russia, China, and North Korea. The ability to get a significant malicious footprint promptly has not been misplaced on these attackers, who are more and more focusing on the IT offer chain to breach company environments.

Impending WEBINARZero Have faith in + Deception: Discover How to Outsmart Attackers!

Find how Deception can detect state-of-the-art threats, halt lateral motion, and boost your Zero Belief method. Sign up for our insightful webinar!

Help you save My Seat!

“AitM kinds of interception would be achievable if the attackers – both LuoYu or Evasive Panda – had been equipped to compromise vulnerable gadgets these kinds of as routers or gateways,” Muñoz elaborated.

“With obtain to ISP spine infrastructure – via lawful or unlawful indicates – Evasive Panda would be capable to intercept and reply to the update requests performed by means of HTTP, or even modify packets.”

This is major as the conclusions appear significantly less than a 7 days following Broadcom-owned Symantec thorough attacks mounted by the menace actor in opposition to telecom provider vendors in Africa working with the MgBot malware framework.

Found this report exciting? Comply with us on Twitter  and LinkedIn to go through additional distinctive information we publish.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «browser security survey: 87% of saas adopters exposed to browser borne Browser Security Survey: 87% of SaaS Adopters Exposed to Browser-borne Attacks
Next Post: Charming Kitten’s New BellaCiao Malware Discovered in Multi-Country Attacks charming kitten's new bellaciao malware discovered in multi country attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
  • Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities
  • 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
  • Romania’s Safetech Leans into UK Cybersecurity Market
  • New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
  • Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
  • Advanced Phishing Attacks Surge 356% in 2022
  • Expo Framework API Flaw Reveals User Data in Online Services
  • NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure
  • Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry

Copyright © TheCyberSecurity.News, All Rights Reserved.