• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
experts link sidewalk malware attacks to grayfly chinese hacker group

Experts Link Sidewalk Malware Attacks to Grayfly Chinese Hacker Group

You are here: Home / General Cyber Security News / Experts Link Sidewalk Malware Attacks to Grayfly Chinese Hacker Group
September 10, 2021

A beforehand undocumented backdoor that was not long ago uncovered focusing on an unnamed personal computer retail corporation based mostly in the U.S. has been linked to a longstanding Chinese espionage operation dubbed Grayfly.

In late August, Slovakian cybersecurity organization ESET disclosed facts of an implant called SideWalk, which is developed to load arbitrary plugins despatched from an attacker-controlled server, gather information about functioning procedures in the compromised units, and transmit the success back to the distant server.

The cybersecurity firm attributed the intrusion to a team it tracks as SparklingGoblin, an adversary believed to be connected to the Winnti (aka APT41) malware household.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


But most recent research published by scientists from Broadcom’s Symantec has pinned the SideWalk backdoor on the China-linked espionage team, pointing out the malware’s overlaps with the more mature Crosswalk malware, with the hottest Grayfly hacking routines singling out a amount of companies in Mexico, Taiwan, the U.S., and Vietnam.

“A attribute of this current campaign was that a significant selection of targets had been in the telecoms sector. The team also attacked companies in the IT, media, and finance sectors,” Symantec’s Threat Hunter Group stated in a write-up posted on Thursday.

Identified to be energetic at the very least considering the fact that March 2017, Grayfly capabilities as the “espionage arm of APT41” notorious for focusing on a range of industries in pursuit of delicate info by exploiting publicly experiencing Microsoft Exchange or MySQL web servers to set up web shells for first intrusion, just before spreading laterally across the network and install extra backdoors that empower the danger actor to manage distant obtain and exfiltrate amassed details.

In a person occasion noticed by Symantec, the adversary’s destructive cyber activity commenced with focusing on an internet reachable Microsoft Trade server to get an preliminary foothold into the network. This was followed by executing a string of PowerShell commands to install an unidentified web shell, ultimately top to the deployment of the Sidewalk backdoor and a personalized variant of the Mimikatz credential-dumping instrument which is been set to use in earlier Grayfly attacks.

“Grayfly is a capable actor, probably to go on to pose a risk to corporations in Asia and Europe across a assortment of industries, together with telecommunications, finance, and media,” the scientists explained. “It truly is probable this group will proceed to create and increase its custom made equipment to boost evasion tactics alongside with using commodity instruments these kinds of as publicly accessible exploits and web shells to support in their attacks.”

Observed this short article appealing? Follow THN on Facebook, Twitter  and LinkedIn to go through additional distinctive content material we publish.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «microsoft warns of cross account takeover bug in azure container instances Microsoft Warns of Cross-Account Takeover Bug in Azure Container Instances
Next Post: UK to Revamp ICO as Part of Data Rules Reform Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.