Article Details
Scrape Timestamp (UTC): 2024-11-21 15:55:10.199
Source: https://thehackernews.com/2024/11/chinese-apt-gelsemium-targets-linux.html
Original Article Text
Click to Toggle View
Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor. The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor dubbed WolfsBane as part of cyber attacks likely targeting East and Southeast Asia. That's according to findings from cybersecurity firm ESET based on multiple Linux samples uploaded to the VirusTotal platform from Taiwan, the Philippines, and Singapore in March 2023. WolfsBane has been assessed to be a Linux version of the threat actor's Gelsevirine backdoor, a Windows malware put to use as far back as 2014. Also discovered by the company is another previously undocumented implant named FireWood that's connected to another malware toolset known as Project Wood. FireWood has been attributed to Gelsemium with low confidence, given the possibility that it could be shared by multiple China-linked hacking crews. "The goal of the backdoors and tools discovered is cyber espionage targeting sensitive data such as system information, user credentials, and specific files and directories," ESET researcher Viktor Šperka said in a report shared with The Hacker News. "These tools are designed to maintain persistent access and execute commands stealthily, enabling prolonged intelligence gathering while evading detection." The exact initial access pathway used by the threat actors is not known, although it's suspected that the threat actors exploited an unknown web application vulnerability to drop web shells for persistent remote access, using it to deliver the WolfsBane backdoor by means of a dropper. Besides using the modified open-source BEURK userland rootkit to conceal its activities on the Linux host, it's capable of executing commands received from an attacker-controlled server. In a similar vein, FireWood employs a kernel driver rootkit module called usbdev.ko to hide processes, and run various commands issued by the server. The use of WolfsBane and FireWood is the first documented use of Linux malware by Gelsemium, signaling an expansion of the targeting focus. "The trend of malware shifting towards Linux systems seems to be on the rise in the APT ecosystem," Šperka said. "From our perspective, this development can be attributed to several advancements in email and endpoint security." "The ever-increasing adoption of EDR solutions, along with Microsoft's default strategy of disabling VBA macros, are leading to a scenario where adversaries are being forced to look for other potential avenues of attack."
Daily Brief Summary
The Chinese APT group Gelsemium has introduced a novel Linux backdoor named WolfsBane, targeting regions in East and Southeast Asia.
Cybersecurity firm ESET detected the WolfsBane backdoor through Linux samples from Taiwan, the Philippines, and Singapore uploaded to VirusTotal in March 2023.
WolfsBane is derived from the previously known Windows malware, Gelsevirine, used since 2014, focusing on cyber espionage specifically.
An additional implant, FireWood, linked with low confidence to Gelsemium, was identified, possibly shared among various Chinese hacking groups.
The primary function of these backdoors is to gather intelligence stealthily by acquiring system data, user credentials, and accessing specific files and directories, while maintaining persistence.
Initial access by Gelsemium is suspected to involve exploiting unknown web application vulnerabilities to facilitate remote access and malware deployment.
Enhanced tools like the BEURK rootkit and the usbdev.ko kernel driver are used within these operations to hide traces on compromised Linux systems and execute remote commands.
This documentation marks Gelsemium's first recorded use of Linux-oriented malware, reflecting a strategic shift towards Linux due to increased email and endpoint security measures.