• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
chinese redfly group compromised a nation's critical grid in 6 month

Chinese Redfly Group Compromised a Nation’s Critical Grid in 6-Month ShadowPad Campaign

You are here: Home / General Cyber Security News / Chinese Redfly Group Compromised a Nation’s Critical Grid in 6-Month ShadowPad Campaign
September 12, 2023

A risk actor named Redfly has been joined to a compromise of a countrywide grid found in an unnamed Asian state for as lengthy as six months previously this year using a recognized malware referred to as ShadowPad.

“The attackers managed to steal credentials and compromise several pcs on the organization’s network,” the Symantec Threat Hunter Crew, component of Broadcom, reported in a report shared with The Hacker Information. “The attack is the most current in a sequence of espionage intrusions towards [critical national infrastructure] targets.”

ShadowPad, also acknowledged as PoisonPlug, is a observe-up to the PlugX distant accessibility trojan and is a modular implant able of loading additional plugins dynamically from a remote server as expected to harvest delicate knowledge from breached networks.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


It has been widely employed by a growing listing of China-nexus country-state teams since at the very least 2019 in attacks aimed at corporations in different business verticals.

Cybersecurity

“ShadowPad is decrypted in memory utilizing a personalized decryption algorithm,” Secureworks Counter Threat Unit (CTU) famous in February 2022. “ShadowPad extracts information and facts about the host, executes commands, interacts with the file method and registry, and deploys new modules to prolong functionality.”

The earliest indicator of an attack focusing on the Asian entity is mentioned to have been recorded on February 23, 2023, when ShadowPad was executed on a one laptop or computer, followed by operating the backdoor a few months later on on May perhaps 17.

Also deployed all-around the exact time was a device identified as Packerloader that is utilised to execute arbitrary shellcode, employing it to modify permissions for a driver file regarded as dump_diskfs.sys to grant entry to all people, elevating the chance that the driver may well have been employed to make file program dumps for afterwards exfiltration.

The threat actors have further been observed functioning PowerShell commands to gather facts on the storage devices connected to the procedure, dump qualifications from Windows Registry, though concurrently clearing security celebration logs from the machine.

“On May well 29, the attackers returned and utilised a renamed model of ProcDump (file name: alg.exe) to dump qualifications from LSASS,” Symantec stated. “On May perhaps 31, a scheduled undertaking is employed to execute oleview.exe, mainly probably to complete side-loading and lateral movement.”

It can be suspected that Redfly employed stolen credentials in order to propagate the an infection to other machines inside the network. After just about a two-month hiatus, the adversary reappeared on the scene to put in a keylogger on July 27 and at the time all over again extract qualifications from LSASS and the Registry on August 3.

Symantec reported the campaign shares infrastructure and tooling overlaps with formerly recognized action attributed to the Chinese state-sponsored group referred to as APT41 (aka Winnti), with Redly practically exclusively focusing on focusing on critical infrastructure entities.

Impending WEBINARWay Much too Susceptible: Uncovering the Condition of the Id Attack Surface area

Realized MFA? PAM? Services account defense? Locate out how nicely-equipped your business certainly is towards identification threats

Supercharge Your Expertise

Having said that, there is no proof that the hacking outfit has staged any disruptive attacks to day.

“Risk actors sustaining a extended-expression, persistent presence on a national grid provides a very clear risk of attacks made to disrupt power materials and other vital products and services in other states throughout occasions of enhanced political rigidity,” the business reported.

The improvement arrives as Microsoft uncovered that China-affiliated actors are honing in on AI-generated visible media for use in affect functions focusing on the U.S. as properly as “conducting intelligence assortment and malware execution in opposition to regional governments and industries” in the South China Sea location given that the begin of the 12 months.

“Raspberry Hurricane consistently targets governing administration ministries, armed forces entities, and company entities connected to critical infrastructure, particularly telecoms,” the tech large stated. “Due to the fact January 2023, Raspberry Typhoon has been significantly persistent.”

Other targets include the U.S. protection industrial foundation (Circle Hurricane, Volt Storm, and Mulberry Hurricane), U.S. critical infrastructure, authorities entities in Europe and the U.S. (Storm-0558), and Taiwan (Flax Storm and Charcoal Hurricane).

Discovered this article exciting? Abide by us on Twitter  and LinkedIn to read through much more special material we article.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «sophisticated phishing campaign deploying agent tesla, originbotnet, and redline clipper Sophisticated Phishing Campaign Deploying Agent Tesla, OriginBotnet, and RedLine Clipper
Next Post: 7 Steps to Kickstart Your SaaS Security Program 7 steps to kickstart your saas security program»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection
  • Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data
  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

Copyright © TheCyberSecurity.News, All Rights Reserved.