• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers warn of chinese aligned hackers targeting south china sea countries

Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries

You are here: Home / General Cyber Security News / Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries
May 22, 2024

Cybersecurity scientists have disclosed aspects of a previously undocumented menace group known as Unfading Sea Haze that’s believed to have been active given that 2018.

The intrusion singled out superior-stage corporations in South China Sea nations around the world, particularly military and federal government targets, Bitdefender stated in a report shared with The Hacker News.

“The investigation revealed a troubling trend further than the historical context,” Martin Zugec, specialized options director at Bitdefender, mentioned, incorporating it discovered a whole of 8 victims to day.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Notably, the attackers regularly regained entry to compromised units. This exploitation highlights a critical vulnerability: weak credential hygiene and insufficient patching methods on uncovered units and web products and services.”

There are some indications that the threat actor driving the attacks is running with targets that are aligned with Chinese pursuits regardless of the truth that the attack signatures do not overlap with individuals of any regarded hacking crew.

This features the victimology footprint, with countries like the Philippines and other businesses in the South Pacific formerly specific by the China-joined Mustang Panda actor.

Cybersecurity

Also utilized in the attacks are several iterations of the Gh0st RAT malware, a commodity trojan acknowledged to be utilized by Chinese-talking danger actors.

“A single specific approach employed by Unfading Sea Haze – working JScript code by way of a device termed SharpJSHandler – resembled a function uncovered in the ‘FunnySwitch’ backdoor, which has been connected to APT41,” Bitdefender mentioned. “The two involve loading .NET assemblies and executing JScript code. On the other hand, this was an isolated similarity.”

The exact preliminary accessibility pathway utilized to infiltrate the targets is now recognized, whilst, in an attention-grabbing twist, Unfading Sea Haze has been noticed regaining access to the very same entities via spear-phishing emails made up of booby-trapped archives.

These archive documents come equipped with Windows shortcut (LNK) information that, when released, set off the infection system by executing a command that’s made to retrieve the up coming-stage payload from a remote server. This payload is a backdoor dubbed SerialPktdoor that’s engineered to operate PowerShell scripts, enumerate directors, download/upload information, and delete information.

What is actually a lot more, the command leverages the Microsoft Develop Engine (MSBuild) to filelessly execute a file found in a distant place, therefore leaving no traces on the sufferer host and reducing the chances of detection.

Chinese

The attack chains are characterized by the use of scheduled tasks as a way to build persistence, with the undertaking names impersonating legit Windows files that are utilized to run a harmless executable that is prone to DLL aspect-loading in get to load a malicious DLL.

“Over and above using scheduled tasks, the attacker employed one more persistence system: manipulating area Administrator accounts,” the Romanian cybersecurity business said. “This concerned tries to enable the disabled community Administrator account, adopted by resetting its password.”

At the very least since September 2022, Unfading Sea Haze is regarded to include commercially readily available Distant Checking and Management (RMM) equipment these types of as ITarian RMM to gain a foothold on sufferer networks, a tactic not typically noticed amongst country-condition actors barring the Iranian MuddyWater team.

The adversary’s sophistication is evidenced by a large selection of custom made equipment in its arsenal, which comprises variants of Gh0st RAT such as SilentGh0st and its evolutionary successor InsidiousGh0st (which comes in C++, C#, and Go versions), TranslucentGh0st, FluffyGh0st, and EtherealGh0st, the latter 3 of which are modular and undertake a plugin-centered technique.

Also set to use is a loader acknowledged as Ps2dllLoader that can bypass the Antimalware Scan Interface (AMSI) and acts as a conduit to deliver SharpJSHandler, which operates by listening for HTTP requests and executes the encoded JavaScript code making use of Microsoft.JScript library.

Cybersecurity

Bitdefender claimed it uncovered two extra flavors of SharpJSHandler that are able of retrieving and running a payload from cloud storage products and services like Dropbox and Microsoft OneDrive, and exporting the benefits again to the exact site.

Ps2dllLoader also is made up of a different backdoor codenamed Stubbedoor which is dependable for launching an encrypted .NET assembly acquired from a command-and-command (C2) server.

Other artifacts deployed about the system of the attacks encompass a keylogger identified as xkeylog, a web browser info stealer, a instrument to check the presence of moveable devices, and a customized data exfiltration method named DustyExfilTool that was place to use involving March 2018 and January 2022.

That is not all. Present between the complex arsenal of malicious agents and applications utilised by Unfading Sea Haze is a third backdoor referred to as SharpZulip that utilizes the Zulip messaging support API to fetch instructions for execution from a stream named “NDFUIBNFWDNSA.” In Zulip, streams (now named channels) are analogous to channels in Discord and Slack.

There is evidence to counsel that the data exfiltration is executed manually by the threat actor in order to capture info of desire, which include info from messaging purposes like Telegram and Viber, and package deal it in the kind of a password-safeguarded archive.

“This blend of customized and off-the-shelf tools, together with handbook information extraction, paints a photo of a specific espionage marketing campaign focused on attaining sensitive info from compromised units,” Zugec pointed out.

“Their custom malware arsenal, such as the Gh0st RAT family and Ps2dllLoader, showcases a aim on overall flexibility and evasion techniques. The observed shift to modularity, dynamic elements, and in-memory execution highlights their attempts to bypass standard security measures.”

Located this report interesting? Observe us on Twitter  and LinkedIn to examine much more exceptional written content we submit.


Some elements of this posting are sourced from:
thehackernews.com

Previous Post: «rockwell advises disconnecting internet facing ics devices amid cyber threats Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats
Next Post: The End of an Era: Microsoft Phases Out VBScript for JavaScript and PowerShell the end of an era: microsoft phases out vbscript for»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.