• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Earth Longzhi Uses “Stack Rumbling” to Disable Security Software

You are here: Home / General Cyber Security News / Earth Longzhi Uses “Stack Rumbling” to Disable Security Software
May 3, 2023

Cybersecurity scientists at Craze Micro have found a new campaign by Earth Longzhi concentrating on organizations dependent in Taiwan, Thailand, the Philippines and Fiji.

As explained in an advisory posted on Tuesday, the marketing campaign depends on a Windows Defender executable to accomplish DLL sideloading when exploiting a vulnerable driver to disable security items mounted on the host machine by means of a provide-your-very own-vulnerable-driver (BYOVD) procedure.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“We also identified that Earth Longzhi makes use of a new way to disable security items, a system we’ve dubbed ‘stack rumbling’ via Graphic File Execution Alternatives (IFEO), which is a new denial-of-assistance (DoS) strategy,” explained Trend Micro researchers Ted Lee and Hara Hiroaki.

The campaign also saw the threat actor installing motorists as kernel-stage solutions via Microsoft Distant Course of action Call (RPC) as an alternative of leveraging regular Windows APIs (application programming interfaces).

“This is a stealthy way to evade common API monitoring. We also observed some appealing samples in our investigation that contained data not only on Earth Longzhi’s possible targets but also approaches for achievable use in upcoming campaigns,” reads the specialized create-up.

Through their investigation, Craze Micro analyzed two separate Earth Longzhi strategies that took position in between 2020 and 2022. The gang is a subgroup of APT41.

Read much more on APT41 right here: China-Aligned “Procedure Tainted Like” Targets Middle East Telecom Providers

“This comply with-up article to our former report aims to flag readers that Earth Longzhi stays in circulation and is envisioned to increase its TTPs,” the corporation wrote. “Although the samples that we’ve collected resemble tests data files, they can continue to be useful simply because they comprise information and facts on Earth Longzhi’s possible targets and new strategies that it may well utilize in the upcoming.”

In accordance to the observed information, the staff inferred that Earth Longzhi may possibly concentrate on Vietnam and Indonesia in long run strategies.

“Notably, the group’s doable abuse of Process Scheduler to escalate privileges for persistence is a new approach that it may possibly use in long term strategies,” Lee and Hiroaki claimed. “Another noteworthy perception is that the risk actors showed an inclination for applying open up-source initiatives to apply their personal applications.”

The Pattern Micro crew added there is evidence suggesting the team increases its toolset in the course of intervals of inactivity.

“With this know-how in intellect, corporations ought to remain vigilant in opposition to the constant progress of new stealthy schemes by cyber criminals.”


Some areas of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «google introduces passwordless secure sign in with passkeys for google accounts Google Introduces Passwordless Secure Sign-In with Passkeys for Google Accounts
Next Post: Apple and Google Unveil Industry Specification For Unwanted Tracking Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Enzo Biochem Hit by Ransomware, 2.5 Million Patients’ Data Compromised
  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.