Article Details

Scrape Timestamp (UTC): 2024-05-23 11:17:05.170

Source: https://thehackernews.com/2024/05/inside-operation-diplomatic-specter.html

Original Article Text

Click to Toggle View

Inside Operation Diplomatic Specter: Chinese APT Group's Stealthy Tactics Exposed. Governmental entities in the Middle East, Africa, and Asia are the target of a Chinese advanced persistent threat (APT) group as part of an ongoing cyber espionage campaign dubbed Operation Diplomatic Specter since at least late 2022. "An analysis of this threat actor's activity reveals long-term espionage operations against at least seven governmental entities," Palo Alto Networks Unit 42 researchers Lior Rochberger and Daniel Frank said in a report shared with The Hacker News. "The threat actor performed intelligence collection efforts at a large scale, leveraging rare email exfiltration techniques against compromised servers." The cybersecurity firm, which previously tracked the activity cluster under the name CL-STA-0043, said it's graduating it to a temporary actor group codenamed TGR-STA-0043 owing to its assessment that the intrusion set is the work of a single actor operating on behalf of Chinese state-aligned interests. Targets of the attacks include diplomatic and economic missions, embassies, military operations, political meetings, ministries of targeted countries, and high-ranking officials. CL-STA-0043 was first documented in June 2023 as targeting government agencies in the Middle East and Africa using rare credential theft and Exchange email exfiltration techniques. A subsequent analysis from Unit 42 towards the end of last year uncovered overlaps between CL-STA-0043 and CL-STA-0002 arising from the use of a program called Ntospy (aka NPPSpy) for credential theft operations. Attack chains orchestrated by the group have involved a set of previously undocumented backdoors such as TunnelSpecter and SweetSpecter, which are both variants of the infamous Gh0st RAT, a tool used profusely in espionage campaigns orchestrated by Beijing government hackers. TunnelSpecter gets its name from the use of DNS tunneling for data exfiltration, giving it an extra layer of stealth. SweetSpecter, on the other hand, is so called for its similarities to SugarGh0st RAT, another custom variant of Gh0st RAT that has been put to use by a suspected Chinese-speaking threat actor since August 2023. Both the backdoors allow the adversary to maintain stealthy access to their targets networks, alongside the ability to execute arbitrary commands, exfiltrate data, and deploy further malware and tools on the infected hosts. "The threat actor appears to closely monitor contemporary geopolitical developments, attempting to exfiltrate information daily," the researchers said. This is realized through targeted efforts to infiltrate targets' mail servers and to search them for information of interest, in some cases repeatedly attempting to regain access when the attackers' activities were detected and disrupted. Initial access is accomplished by the exploitation of known Exchange server flaws such as ProxyLogon and ProxyShell. "The threat actor searched for particular keywords and exfiltrated anything they could find related to them, such as entire archived inboxes belonging to particular diplomatic missions or individuals," the researchers pointed out. "The threat actor also exfiltrated files related to topics they were searching for." The Chinese links to Operation Diplomatic Specter further stem from the use of operational infrastructure exclusively used by China-nexus groups like APT27, Mustang Panda, and Winnti, not to mention tools like the China Chopper web shell and PlugX. "The exfiltration techniques observed as part of Operation Diplomatic Specter provide a distinct window into the possible strategic objectives of the threat actor behind the attacks," the researchers concluded. "The threat actor searched for highly sensitive information, encompassing details about military operations, diplomatic missions and embassies and foreign affairs ministries."

Daily Brief Summary

NATION STATE ACTIVITY // Chinese APT Exploits Global Entities in Espionage Campaign

A Chinese advanced persistent threat (APT) group has targeted several governmental entities in the Middle East, Africa, and Asia since late 2022 as part of Operation Diplomatic Specter.

Palo Alto Networks’ Unit 42 highlighted the use of sophisticated techniques including rare email exfiltration tactics against compromised servers for espionage.

Targets included diplomatic missions, military operations, and high-ranking officials, with the attacks aimed at intelligence gathering on a large scale.

The APT group utilized previously undocumented backdoors, dubbed TunnelSpecter and SweetSpecter, to maintain stealth and exfiltrate data.

Initial infiltration leveraged known vulnerabilities in Exchange servers, with subsequent actions focused on keyword searches within mail servers to exfiltrate sensitive information.

Overlaps in techniques and tools suggest ties between earlier tracked activities and known China-nexus groups such as APT27 and Mustang Panda.

Researchers observed daily efforts by the threat actor to monitor geopolitical developments and extract relevant information, indicating highly strategic espionage objectives.