Chinese hacking groups target Russian government, IT firms

China

A series of targeted cyberattacks that started at the end of July 2024, targeting dozens of systems used in Russian government organizations and IT companies, are linked to Chinese hackers of the APT31 and APT 27 groups.

Kaspersky, who discovered the activity, dubbed the campaign “EastWind,” reporting that it employs an updated version of the CloudSorcerer backdoor spotted in a similar cyberespionage campaign from May 2024, also targeting Russian government entities.

It should be noted that the CloudSorcerer activity isn’t bound to Russia, as Proofpoint recorded an attack targeting a U.S.-based think tank in May 2024.

EastWind toolkit

The initial infection relies on phishing emails carrying RAR archive attachments named after the target, which employ DLL side loading to drop a backdoor on the system from Dropbox while opening a document for deception.

The backdoor can navigate the filesystem, execute commands, exfiltrate data, or introduce additional payloads on the compromised machine.

Kaspersky’s observations reveal that the attackers used the backdoor to introduce a trojan named ‘GrewApacha,’ which has been associated with APT31.

The most recent variant of GrewApacha features some improvements compared to the last analyzed version from 2023, including using two command servers instead of one, storing their address in a base64-encoded string on GitHub profiles from where the malware reads it.

C2 address “hidden” in public profiles
Source: Kaspersky

Another malware loaded by the backdoor is a refreshed version of CloudSorcerer packed with VMProtect for evasion.

CloudSorcerer uses an encryption protection mechanism designed to prevent its execution on non-targeted systems by employing a unique key generation process tied to the victim’s machine.

Upon execution, a utility (GetKey.exe) generates a unique four-byte number from the system’s current state and encrypts it using the Windows CryptProtectData function to derive a unique, system-bound ciphertext.

If execution of the malware is attempted on any other machine, the generated key will differ, so the CloudSorcerer payload decryption will fail.

Main GetKey function
Main GetKey function
Source: Kaspersky

The new version of CloudSorcerer also uses public profile pages to get its initial C2 address but has now switched from GitHub to using Quora and the Russian social media network LiveJournal for this purpose.

The third implant seen in the EastWind attacks, introduced through CloudSorcered, is PlugY, a previously unknown backdoor.

PlugY features high versatility in its C2 communications and the ability to execute commands for file operations, shell command execution, screen capturing, key-logging, and clipboard monitoring.

Kaspersky’s analysis indicates that the code used in PlugY has been previously seen in attacks by the APT27 threat group.

Also, a library used for C2 communications through the UDP protocol is found only in DRBControl and PlugX, which are malware tools extensively used by Chinese threat actors.

Code similarities between DRBControl (left) and PlugY (right)
Code similarities between DRBControl (left) and PlugY (right)
Source: Kaspersky

Kaspersky comments that, as the backdoors used in the EastWind attacks are notably different, detecting them all on a compromised machine is challenging. Some things to look out for are:

  • DLL files larger than 5MB in size in the ‘C:UsersPublic’ directory
  • Unsigned ‘msedgeupdate.dll’ files in the file system
  • A running process named ‘msiexec.exe’ for each logged-in user

The Russian cybersecurity firm concludes that APT27 and APT31 are likely working together in EastWind.

This case highlights the complex interplay between allied countries with strong diplomatic ties and common strategic goals yet active cyberespionage operations against each other.

Collaboration in economic, security, and military fields does not exclude intelligence agencies operating in the shadows from launching sophisticated and narrow-targeted espionage operations to collect valuable intelligence.

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Crypto.com Customers Have Been Stolen Millions in Bitcoin and Ethereum thumbnail

Crypto.com Customers Have Been Stolen Millions in Bitcoin and Ethereum

La plateforme Crypto.com a annoncé avoir remboursé intégralement les victimes. Le casse est évalué à quelques dizaines de millions d’euros.Il y a donc bien eu un accès frauduleux à la plateforme Crypto.com et qui a débouché sur des transactions indésirables dans certaines crypto-monnaies. C’est ce que le service a fini par admettre le jeudi 20…
Read More
iPhone 13 Pro Max beats the Galaxy S21 Ultra at speed thumbnail

iPhone 13 Pro Max beats the Galaxy S21 Ultra at speed

A Apple apresentou recentemente a nova gama iPhone 13 que é alimentada pelo chipset A15. Historicamente os processadores desenvolvidos pela Apple acabam por ser sempre mais rápidos do que os concorrentes Android e aparentemente esta situação mantém-se. Assim para comprovar isto o YouTuber PhoneBuff colocou lado-a-lado as bombas dos dois lados. Se por um lado…
Read More
Smartphones and laptops on the big screen!10% off HDMI transceivers that can wirelessly mirror large TVs thumbnail

Smartphones and laptops on the big screen!10% off HDMI transceivers that can wirelessly mirror large TVs

仕事もエンタメも、画面はデカい方が良いよね。PC周辺機器メーカーのj5createより、HDMIを無線にして外部ディスプレイに映せるドングルが2種類登場しました。配線がスッキリするので、テレワークやスライドショーを使った会議、またお店で広告や映像を流す際にも活躍します。Image: j5createUSB-C専用「JVAW62」ノートPCやスマートフォン、タブレットにあるUSB-Cポートに送信機を挿し込んでミラーリングするのが「JVAW62 ScreenCast USB-C ワイヤレスHDMI受送信機」。動画配信も見られて、AirPlayやMiracastも対応します。Video: j5create Japan/YouTube設定やソフトのインストールが要らず、挿すだけでOKというお手軽さ。最大15mまで離れても使えるので、家の中ならほぼカバーでき、会議室の一番後ろからでも操作できそうですね。Wi-Fiなしでも使える「JVAW76」PCやスマホと有線接続をせず、Wi-Fi/Airplay/Miracast/Google castを使って大画面に映すのが「JVAW76 ScreenCast 4K ワイヤレスHDMIドングルレシーバー」。こちらは送信機がないので、デスクがもっとスッキリします。Video: j5create Japan/YouTubeミラーリングだけでなく拡張モードもあるので、2画面でマルチタスクができますね。もちろんYouTubeなどのエンタメだってバッチ来いです。ただAmazon Prime Videoと、Netflixは接続方法によっては映せないので、予め調べておきましょう。寒い時期は大画面に動画を映して、ぬくぬくホームシアターを楽しんでみてはいかがでしょうか? ※なお、以下の価格など表示内容は、執筆現在のものです。変更の可能性もありますので、販売ページをご確認ください。Source: Amazon (1, 2) , YouTube (1, 2) via j5create (1, 2) via PC Watch
Read More
Index Of News
Total
0
Share