• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
chinese tonto team hackers' second attempt to target cybersecurity firm

Chinese Tonto Team Hackers’ Second Attempt to Target Cybersecurity Firm Group-IB Fails

You are here: Home / General Cyber Security News / Chinese Tonto Team Hackers’ Second Attempt to Target Cybersecurity Firm Group-IB Fails
February 13, 2023

The advanced persistent danger (APT) actor recognised as Tonto Group carried out an unsuccessful attack on cybersecurity organization Group-IB in June 2022.

The Singapore-headquartered firm said that it detected and blocked malicious phishing e-mail originating from the group concentrating on its workers. It really is also the second attack aimed at Team-IB, the initially of which took position in March 2021.

Tonto Crew, also identified as Bronze Huntley, Cactus Pete, Earth Akhlut, Karma Panda, and UAC-0018, is a suspected Chinese hacking team that has been connected to attacks concentrating on a large assortment of businesses in Asia and Eastern Europe.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The actor is recognized to be energetic because at minimum 2009 and is mentioned to share ties to the Third Office (3PLA) of the People’s Liberation Army’s Shenyang TRB (Unit 65016).

Attack chains contain spear-phishing lures containing malicious attachments established working with the Royal Road Prosperous Textual content Format (RTF) exploitation toolkit to drop backdoors like Bisonal, Dexbia, and ShadowPad (aka PoisonPlug).

“A marginally various technique […] utilized by this menace actor in the wild is the use of authentic company email addresses, most possible obtained by phishing, to mail emails to other users,” Development Micro disclosed in 2020. “The use of these reputable email messages improves the chances of the victims clicking on the attachment, infecting their machines with malware.”

Cybersecurity Firm Group-IB Fails

The adversarial collective, in March 2021, also emerged as just one of the menace actors to exploit the ProxyLogon flaws in Microsoft Exchange Server to strike cybersecurity and procuring companies primarily based in Jap Europe.

Coinciding with Russia’s military services invasion of Ukraine last yr, the Tonto Group was noticed targeting Russian scientific and specialized enterprises and govt businesses with the Bisonal malware.

The attempted attack on Team-IB is no distinctive in that the menace actor leveraged phishing e-mails to distribute destructive Microsoft Office environment documents made with the

Royal Street weaponizer to deploy Bisonal.

“This malware gives remote accessibility to an infected laptop or computer and lets an attacker to execute various instructions on it,” researchers Anastasia Tikhonova and Dmitry Kupin reported in a report shared with The Hacker Information.

Also employed is a previously undocumented downloader referred to as QuickMute by the Computer system Crisis Reaction Workforce of Ukraine (CERT-UA), which is mainly accountable for retrieving future-phase malware from a remote server.

“The primary ambitions of Chinese APTs are espionage and intellectual assets theft,” the scientists mentioned. “Unquestionably, Tonto Team will continue to keep probing IT and cybersecurity providers by leveraging spear-phishing to produce destructive documents utilizing vulnerabilities with decoys specially well prepared for this intent.”

Located this short article exciting? Stick to us on Twitter  and LinkedIn to read far more exclusive written content we post.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «hackers targeting u.s. and german firms monitor victims' desktops with Hackers Targeting U.S. and German Firms Monitor Victims’ Desktops with Screenshotter
Next Post: Namecheap Customers Flooded with Phishing Emails Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • KillNet Group Uses DDoS Attacks Against Azure-Based Healthcare Apps
  • Mispadu Trojan Steals 90,000+ Banking Credentials From Latin American Victims
  • BreachForums Admin Arrested in New York
  • New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads
  • Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen
  • Latitude hack now under state investigation as customers struggle to protect their accounts
  • Hacker who ran BreachForums could face 20 years in prison
  • UK Ransomware Incident Volumes Surge 17% in 2022
  • New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain Breaches
  • “Hinata” Botnet Could Launch Massive DDoS Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.