Article Details

Scrape Timestamp (UTC): 2024-04-19 13:49:58.674

Source: https://thehackernews.com/2024/04/blacktech-targets-tech-research-and-gov.html

Original Article Text

Click to Toggle View

BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool. Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called BlackTech as part of a recent cyber attack wave. The intrusions pave the way for an updated version of modular backdoor dubbed Waterbear as well as its enhanced successor referred to as Deuterbear. "Waterbear is known for its complexity, as it uses a number of evasion mechanisms to minimize the chance of detection and analysis," Trend Micro researchers Cyris Tseng and Pierre Lee said in an analysis last week. "In 2022, Earth Hundun began using the latest version of Waterbear — also known as Deuterbear — which has several changes, including anti-memory scanning and decryption routines, that make us consider it a different malware entity from the original Waterbear." The cybersecurity firm is tracking the threat actor under the moniker Earth Hundun, which is known to be active since at least 2007. It also goes by other names such as Circuit Panda, HUAPI, Manga Taurus, Palmerworm, Red Djinn, and Temp.Overboard. In a joint advisory published last September, cybersecurity and intelligence agencies from Japan and the U.S. attributed the adversary to China, describing its ability to modify router firmware and exploit routers' domain-trust relationships to pivot from international subsidiaries to their corporate headquarters based in the two countries. "BlackTech actors use custom malware, dual-use tools, and living-off-the-land tactics, such as disabling logging on routers, to conceal their operations," the governments said. "Upon gaining an initial foothold into a target network and gaining administrator access to network edge devices, BlackTech cyber actors often modify the firmware to hide their activity across the edge devices to further maintain persistence in the network." One of the crucial tools in its multifaceted arsenal is Waterbear (aka DBGPRINT), which has been put to use since 2009 and has been consistently updated over the years with improved defense evasion features. The core remote access trojan is fetched from a command-and-control (C2) server by means of a downloader, which is launched using a loader that, in turn, is executed via a known technique called DLL side-loading. The newest version of the implant supports nearly 50 commands, enabling it to perform a wide range of activities, including process enumeration and termination, file operations, window management, start and exit remote shell, screenshot capture, and Windows Registry modification, among others. Also delivered using a similar infection flow since 2022 is Deuterbear, whose downloader implements an array of obfuscation methods to resist anti-analysis and uses HTTPS for C2 communications. "Since 2009, Earth Hundun has continuously evolved and refined the Waterbear backdoor, as well as its many variants and branches," the researchers said. "The Deuterbear downloader employs HTTPS encryption for network traffic protection and implements various updates in malware execution, such as altering the function decryption, checking for debuggers or sandboxes, and modifying traffic protocols." Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

MALWARE // BlackTech's Deuterbear Targets Tech Sectors with Advanced Malware

BlackTech, a cyber threat actor attributed to China, has been actively targeting technology, research, and government sectors in the Asia-Pacific region.

The group uses a sophisticated tool called "Deuterbear," an enhanced version of the previously known Waterbear malware, which includes advanced evasion and anti-analysis capabilities.

Trend Micro highlights that Deuterbear is equipped with features like anti-memory scanning and different decryption routines, distinguishing it significantly from its predecessor.

Cyber attacks by BlackTech frequently involve modifying router firmware and exploiting trust relationships to move laterally from international subsidiaries to corporate HQs.

Their tactics include using custom malware, exploiting legitimate administrative tools, and disabling logging on routers to conceal their activities.

Waterbear, a core component of their attacks, has been in use since 2009 and is constantly updated to evade defense mechanisms, supporting nearly 50 different malicious commands.

The newer Deuterbear variant employs HTTPS for secure command and control communications and incorporates multiple obfuscation techniques to avoid detection.