• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover espionage tactics of china based apt groups in southeast

Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia

You are here: Home / General Cyber Security News / Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia
December 11, 2024

A suspected China-based threat actor has been linked to a series of cyber attacks targeting high-profile organizations in Southeast Asia since at least October 2023.

The espionage campaign targeted organizations in various sectors spanning government ministries in two different countries, an air traffic control organization, a telecoms company, and a media outlet, the Symantec Threat Hunter Team said in a new report shared with The Hacker News.

The attacks, which leveraged tools previously identified as linked to China-based advanced persistent threat (APT) groups, are characterized by the use of both open-source and living-off-the-land (LotL) techniques.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

This includes the use of reverse proxy programs such as Rakshasa and Stowaway, as well as asset discovery and identification tools, keyloggers, and password stealers. Also deployed during the course of the attacks is PlugX (aka Korplug), a remote access trojan put to use by several Chinese hacking groups.

“The threat actors also install customized DLL files that act as authentication mechanism filters, allowing them to intercept login credentials,” Symantec noted.

In one of the attacks targeting an entity that lasted for three months between June and August 2024, the adversary conducted reconnaissance and password dumping activities, while also installing a keylogger and executing DLL payloads capable of capturing user login information.

Symantec noted that the attackers managed to retain covert access to compromised networks for extended periods of time, allowing them to harvest passwords and map networks of interest. The gathered information was compressed into password-protected archives using WinRAR and then uploaded to cloud storage services such as File.io.

“This extended dwell time and calculated approach underscore the sophistication and persistence of the threat actors,” the company noted. “The geographical location of targeted organizations, as well as the use of tools linked previously to China-based APT groups, suggests that this activity is the work of China-based actors.”

It’s worth noting that the ambiguity in attributing these attacks to a specific Chinese threat actor underscores the difficulty of tracking cyber espionage groups when they frequently share tools and use similar tradecrafts.

Cybersecurity

The geopolitical tensions in Southeast Asia over ongoing territorial disputes in the South China Sea have been complemented by a series of cyber attacks targeting the region, as evidenced by threat activity groups tracked as Unfading Sea Haze, Mustang Panda, CeranaKeeper, and Operation Crimson Palace.

The development comes a day after SentinelOne SentinelLabs and Tinexta Cyber disclosed attacks undertaken by a China-nexus cyber espionage group targeting large business-to-business IT service providers in Southern Europe as part of an activity cluster dubbed Operation Digital Eye.

Last week, Symantec also revealed that an unnamed large U.S. organization was breached by likely Chinese threat actors between April and August 2024, during which time they laterally across its network, compromising multiple computers and potentially exfiltrating data.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «microsoft fixes 72 flaws, including patch for actively exploited clfs Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability
Next Post: Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017 chinese eaglemsgspy spyware found exploiting mobile devices since 2017»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.