• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
chinese redfly group compromised a nation's critical grid in 6 month

Chinese Redfly Group Compromised a Nation’s Critical Grid in 6-Month ShadowPad Campaign

You are here: Home / General Cyber Security News / Chinese Redfly Group Compromised a Nation’s Critical Grid in 6-Month ShadowPad Campaign
September 12, 2023

A risk actor named Redfly has been joined to a compromise of a countrywide grid found in an unnamed Asian state for as lengthy as six months previously this year using a recognized malware referred to as ShadowPad.

“The attackers managed to steal credentials and compromise several pcs on the organization’s network,” the Symantec Threat Hunter Crew, component of Broadcom, reported in a report shared with The Hacker Information. “The attack is the most current in a sequence of espionage intrusions towards [critical national infrastructure] targets.”

ShadowPad, also acknowledged as PoisonPlug, is a observe-up to the PlugX distant accessibility trojan and is a modular implant able of loading additional plugins dynamically from a remote server as expected to harvest delicate knowledge from breached networks.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


It has been widely employed by a growing listing of China-nexus country-state teams since at the very least 2019 in attacks aimed at corporations in different business verticals.

Cybersecurity

“ShadowPad is decrypted in memory utilizing a personalized decryption algorithm,” Secureworks Counter Threat Unit (CTU) famous in February 2022. “ShadowPad extracts information and facts about the host, executes commands, interacts with the file method and registry, and deploys new modules to prolong functionality.”

The earliest indicator of an attack focusing on the Asian entity is mentioned to have been recorded on February 23, 2023, when ShadowPad was executed on a one laptop or computer, followed by operating the backdoor a few months later on on May perhaps 17.

Also deployed all-around the exact time was a device identified as Packerloader that is utilised to execute arbitrary shellcode, employing it to modify permissions for a driver file regarded as dump_diskfs.sys to grant entry to all people, elevating the chance that the driver may well have been employed to make file program dumps for afterwards exfiltration.

The threat actors have further been observed functioning PowerShell commands to gather facts on the storage devices connected to the procedure, dump qualifications from Windows Registry, though concurrently clearing security celebration logs from the machine.

“On May well 29, the attackers returned and utilised a renamed model of ProcDump (file name: alg.exe) to dump qualifications from LSASS,” Symantec stated. “On May perhaps 31, a scheduled undertaking is employed to execute oleview.exe, mainly probably to complete side-loading and lateral movement.”

It can be suspected that Redfly employed stolen credentials in order to propagate the an infection to other machines inside the network. After just about a two-month hiatus, the adversary reappeared on the scene to put in a keylogger on July 27 and at the time all over again extract qualifications from LSASS and the Registry on August 3.

Symantec reported the campaign shares infrastructure and tooling overlaps with formerly recognized action attributed to the Chinese state-sponsored group referred to as APT41 (aka Winnti), with Redly practically exclusively focusing on focusing on critical infrastructure entities.

Impending WEBINARWay Much too Susceptible: Uncovering the Condition of the Id Attack Surface area

Realized MFA? PAM? Services account defense? Locate out how nicely-equipped your business certainly is towards identification threats

Supercharge Your Expertise

Having said that, there is no proof that the hacking outfit has staged any disruptive attacks to day.

“Risk actors sustaining a extended-expression, persistent presence on a national grid provides a very clear risk of attacks made to disrupt power materials and other vital products and services in other states throughout occasions of enhanced political rigidity,” the business reported.

The improvement arrives as Microsoft uncovered that China-affiliated actors are honing in on AI-generated visible media for use in affect functions focusing on the U.S. as properly as “conducting intelligence assortment and malware execution in opposition to regional governments and industries” in the South China Sea location given that the begin of the 12 months.

“Raspberry Hurricane consistently targets governing administration ministries, armed forces entities, and company entities connected to critical infrastructure, particularly telecoms,” the tech large stated. “Due to the fact January 2023, Raspberry Typhoon has been significantly persistent.”

Other targets include the U.S. protection industrial foundation (Circle Hurricane, Volt Storm, and Mulberry Hurricane), U.S. critical infrastructure, authorities entities in Europe and the U.S. (Storm-0558), and Taiwan (Flax Storm and Charcoal Hurricane).

Discovered this article exciting? Abide by us on Twitter  and LinkedIn to read through much more special material we article.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «sophisticated phishing campaign deploying agent tesla, originbotnet, and redline clipper Sophisticated Phishing Campaign Deploying Agent Tesla, OriginBotnet, and RedLine Clipper
Next Post: 7 Steps to Kickstart Your SaaS Security Program 7 steps to kickstart your saas security program»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.