Article Details

Scrape Timestamp (UTC): 2023-09-20 02:01:57.759

Source: https://thehackernews.com/2023/09/earth-luscas-new-sprysocks-linux.html

Original Article Text

Click to Toggle View

Earth Lusca's New SprySOCKS Linux Backdoor Targets Government Entities. The China-linked threat actor known as Earth Lusca has been observed targeting government entities using a never-before-seen Linux backdoor called SprySOCKS. Earth Lusca was first documented by Trend Micro in January 2022, detailing the adversary's attacks against public and private sector entities across Asia, Australia, Europe, North America. Active since 2021, the group has relied on spear-phishing and watering hole attacks to pull off its cyber espionage schemes. Some activities of the group overlap with another threat cluster tracked by Recorded Future under the name RedHotel. The latest findings from the cybersecurity firm show that Earth Lusca continues to be an active group, even expanding its operations to target organizations across the world during the first half of 2023. Primary targets include government departments that are involved in foreign affairs, technology, and telecommunications. The attacks are concentrated in Southeast Asia, Central Asia, and the Balkans. Infection sequences start with the exploitation of known security flaws in public-facing Fortinet (CVE-2022-39952 and CVE-2022-40684), GitLab (CVE-2021-22205), Microsoft Exchange Server (ProxyShell), Progress Telerik UI (CVE-2019-18935), and Zimbra (CVE-2019-9621 and CVE-2019-9670) servers to drop web shells and deliver Cobalt Strike for lateral movement. "The group intends to exfiltrate documents and email account credentials, as well as to further deploy advanced backdoors like ShadowPad and the Linux version of Winnti to conduct long-term espionage activities against its targets," security researchers Joseph C. Chen and Jaromir Horejsi said. The server used to deliver Cobalt Strike and Winnti has also been observed to host SprySOCKS, which has its roots in the open-source Windows backdoor Trochilus. It's worth noting that the use of Trochilus has been tied to a Chinese hacking crew called Webworm in the past. Loaded by means of a variant of an ELF injector component known as mandibule, SprySOCKS is equipped to gather system information, start an interactive shell, create and terminate SOCKS proxy, and perform various file and directory operations. Stay ahead with actionable insights on how ITDR identifies and mitigates threats. Learn about the indispensable role of SSPM in ensuring your identity remains unbreachable. Command-and-control (C2) communication consists of packets sent via the Transmission Control Protocol (TCP) protocol, mirroring a structure used by a Windows-based trojan referred to as RedLeaves, itself said to be built on top of Trochilus. At least two different samples of SprySOCKS (versions 1.1 and 1.3.6) have been identified to date, suggesting that the malware is being continually modified by the attackers to add new features. "It is important that organizations proactively manage their attack surface, minimizing the potential entry points into their system and reducing the likelihood of a successful breach," the researchers said. "Businesses should regularly apply patches and update their tools, software, and systems to ensure their security, functionality, and overall performance."

Daily Brief Summary

CYBERCRIME // Chinese-linked Earth Lusca Expands Cyber Espionage Operations with Linux Backdoor SprySOCKS

The China-linked threat actor, Earth Lusca, is targeting global government entities, largely concentrating on those involved in foreign affairs, technology, and telecommunications from Southeast Asia, Central Asia and the Balkans, through a newly-developed Linux backdoor named SprySOCKS.

Initially documented by Trend Micro in January 2022, Earth Lusca has been active since 2021, using spear-phishing and watering hole attacks for its cyber espionage operations, extending to include actions related to another threat called RedHotel.

Public-facing Fortinet, GitLab, Microsoft Exchange Server, Progress Telerik UI, and Zimbra servers are being exploited for delivering web shells and the Cobalt Strike tool to facilitate lateral movement.

In addition to documents and email account credentials, the group aims to deploy advanced backdoors like ShadowPad and the Linux version of Winnti for long term espionage activities.

The Linux backdoor, SprySOCKS, attending the Cobalt Strike and Winnti delivery server, can collect system information, start an interactive shell, create and terminate SOCKS proxy, and perform several file and directory operations.

Researchers suggest continuous update and patching of tools, software, and systems for mitigating potential threats and reducing the chances of a successful breach in the organization's security.