• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Earth Longzhi Uses “Stack Rumbling” to Disable Security Software

You are here: Home / General Cyber Security News / Earth Longzhi Uses “Stack Rumbling” to Disable Security Software
May 3, 2023

Cybersecurity scientists at Craze Micro have found a new campaign by Earth Longzhi concentrating on organizations dependent in Taiwan, Thailand, the Philippines and Fiji.

As explained in an advisory posted on Tuesday, the marketing campaign depends on a Windows Defender executable to accomplish DLL sideloading when exploiting a vulnerable driver to disable security items mounted on the host machine by means of a provide-your-very own-vulnerable-driver (BYOVD) procedure.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“We also identified that Earth Longzhi makes use of a new way to disable security items, a system we’ve dubbed ‘stack rumbling’ via Graphic File Execution Alternatives (IFEO), which is a new denial-of-assistance (DoS) strategy,” explained Trend Micro researchers Ted Lee and Hara Hiroaki.

The campaign also saw the threat actor installing motorists as kernel-stage solutions via Microsoft Distant Course of action Call (RPC) as an alternative of leveraging regular Windows APIs (application programming interfaces).

“This is a stealthy way to evade common API monitoring. We also observed some appealing samples in our investigation that contained data not only on Earth Longzhi’s possible targets but also approaches for achievable use in upcoming campaigns,” reads the specialized create-up.

Through their investigation, Craze Micro analyzed two separate Earth Longzhi strategies that took position in between 2020 and 2022. The gang is a subgroup of APT41.

Read much more on APT41 right here: China-Aligned “Procedure Tainted Like” Targets Middle East Telecom Providers

“This comply with-up article to our former report aims to flag readers that Earth Longzhi stays in circulation and is envisioned to increase its TTPs,” the corporation wrote. “Although the samples that we’ve collected resemble tests data files, they can continue to be useful simply because they comprise information and facts on Earth Longzhi’s possible targets and new strategies that it may well utilize in the upcoming.”

In accordance to the observed information, the staff inferred that Earth Longzhi may possibly concentrate on Vietnam and Indonesia in long run strategies.

“Notably, the group’s doable abuse of Process Scheduler to escalate privileges for persistence is a new approach that it may possibly use in long term strategies,” Lee and Hiroaki claimed. “Another noteworthy perception is that the risk actors showed an inclination for applying open up-source initiatives to apply their personal applications.”

The Pattern Micro crew added there is evidence suggesting the team increases its toolset in the course of intervals of inactivity.

“With this know-how in intellect, corporations ought to remain vigilant in opposition to the constant progress of new stealthy schemes by cyber criminals.”


Some areas of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «google introduces passwordless secure sign in with passkeys for google accounts Google Introduces Passwordless Secure Sign-In with Passkeys for Google Accounts
Next Post: Apple and Google Unveil Industry Specification For Unwanted Tracking Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
  • Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
  • The Hidden Weaknesses in AI SOC Tools that No One Talks About
  • Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
  • Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
  • North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.