Article Details

Scrape Timestamp (UTC): 2024-06-05 11:22:47.401

Source: https://thehackernews.com/2024/06/chinese-state-backed-cyber-espionage.html

Original Article Text

Click to Toggle View

Chinese State-Backed Cyber Espionage Targets Southeast Asian Government. An unnamed high-profile government organization in Southeast Asia emerged as the target of a "complex, long-running" Chinese state-sponsored cyber espionage operation codenamed Crimson Palace. "The overall goal behind the campaign was to maintain access to the target network for cyberespionage in support of Chinese state interests," Sophos researchers Paul Jaramillo, Morgan Demboski, Sean Gallagher, and Mark Parsons said in a report shared with The Hacker News. "This includes accessing critical IT systems, performing reconnaissance of specific users, collecting sensitive military and technical information, and deploying various malware implants for command-and-control (C2) communications." The name of the government organization was not disclosed, but the company said the country is known to have repeated conflict with China over territory in the South China Sea, raising the possibility that it may be the Philippines, which has been previously targeted by Chinese state-sponsored groups like Mustang Panda in the past. Crimson Palace comprises three intrusion clusters, some of which share the same tactics, although there is evidence of older activity dating back to March 2022 - Sophos assessed that these overlapping activity clusters were likely part of a coordinated campaign under the direction of a single organization. The attack is notable for the use of previously undocumented malware like PocoProxy as well as an updated version of EAGERBEE, alongside other known malware families like NUPAKAGE, PowHeartBeat, RUDEBIRD, DOWNTOWN (PhantomNet), and EtherealGh0st (aka CCoreDoor). Other hallmarks of the campaign include the extensive use of DLL side-loading and unusual tactics to stay under the radar. "The threat actors leveraged many novel evasion techniques, such as overwriting DLL in memory to unhook the Sophos AV agent process from the kernel, abusing AV software for sideloading, and using various techniques to test the most efficient and evasive methods of executing their payloads," the researchers said. Further investigation has revealed that Cluster Alpha focused towards mapping server subnets, enumerating administrator accounts, and conducting reconnaissance on Active Directory infrastructure, with Cluster Bravo prioritizing the use of valid accounts for lateral movement and dropping EtherealGh0st. Activity associated with Cluster Charlie, which took place for the longest period, entailed the use of PocoProxy to establish persistence on compromised systems and the deployment of HUI Loader, a custom loader used by several China-nexus actors, to deliver Cobalt Strike. "The observed clusters reflect the operations of two or more distinct actors working in tandem with shared objectives," the researchers noted. "The observed clusters reflect the work of a single group with a large array of tools, diverse infrastructure, and multiple operators." The disclosure comes as cybersecurity firm Yoroi detailed attacks orchestrated by the APT41 actor (aka Brass Typhoon, HOODOO, and Winnti) targeting organizations in Italy with a variant of the PlugX (aka Destroy RAT and Korplug) malware known as KEYPLUG. "Written in C++ and active since at least June 2021, KEYPLUG has variants for both Windows and Linux platforms," Yoroi said. "It supports multiple network protocols for command and control (C2) traffic, including HTTP, TCP, KCP over UDP, and WSS, making it a potent tool in APT41's cyber-attack arsenal." It also follows an advisory from the Canadian Centre for Cyber Security warning of increasing attacks from Chinese state-backed hacking aimed at infiltrating government, critical infrastructure, and research and development sectors. "[People's Republic of China] cyber threat activity outpaces other nation-state cyber threats in volume, sophistication and the breadth of targeting," the agency said, calling out their use of compromised small office and home office (SOHO) routers and living-off-the-land techniques to conduct cyber threat activity and avoid detection. Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.

Daily Brief Summary

NATION STATE ACTIVITY // Chinese Cyber Espionage Operation Targets Southeast Asian Government

A Southeast Asian government organization was targeted by a sophisticated Chinese state-sponsored cyber espionage campaign named Crimson Palace.

The espionage operation aimed to infiltrate network systems to gather military and technical data for China's strategic interests.

Sophos identified the use of complex malware tools including PocoProxy, EAGERBEE, and others for maintaining control over the infiltrated networks.

Evasion tactics were notably sophisticated, including DLL side-loading and exploiting antivirus software to avoid detection.

The campaign involved multiple clusters with specific roles, from server mapping and account enumeration to persistent access and lateral movement within networks.

Researchers link the campaign's heightened activity to ongoing territorial disputes in the South China Sea, possibly implicating the Philippines as a target.

Continuous advancements in malware and attack techniques highlight the need for enhanced cybersecurity measures in government and critical infrastructure sectors.