Article Details

Scrape Timestamp (UTC): 2025-02-18 09:55:02.607

Source: https://thehackernews.com/2025/02/winnti-apt41-targets-japanese-firms-in.html

Original Article Text

Click to Toggle View

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign. The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to be a subset within the APT41 cyber espionage group, by Cybereason under the name Operation CuckooBees, and by Symantec as Blackfly. APT41 has been described as a highly skilled and methodical actor with the ability to mount espionage attacks as well as poison the supply chain. Its campaigns are often designed with stealth in mind, leveraging a bevy of tactics to achieve its goals by using a custom toolset that not only bypasses security software installed in the environment, but also harvests critical information and establishes covert channels for persistent remote access. "The group's espionage activities, many of which are aligned with the nation's strategic objectives, have targeted a wide range of public and private industry sectors around the world," LAC said. "The attacks of this threat group are characterized by the use of Winnti malware, which has a unique rootkit that allows for the hiding and manipulation of communications, as well as the use of stolen, legitimate digital certificates in the malware." Winnti, active since at least 2012, has primarily singled out manufacturing and materials-related organizations in Asia as of 2022, with recent campaigns between November 2023 and October 2024 targeting the Asia-Pacific (APAC) region exploiting weaknesses in public-facing applications like IBM Lotus Domino to deploy malware as follows - The latest attack chain documented by LAC has been found to exploit an SQL injection vulnerability in an unspecified enterprise resource planning (ERP) system to drop web shells such as China Chopper and Behinder (aka Bingxia and IceScorpion) on the compromised server, using the access to perform reconnaissance, collect credentials for lateral movement, and deliver an improved version of the Winnti malware. The intrusion's reach is said to have been expanded further to breach a managed service provider (MSP) by leveraging a shared account, followed by weaponizing the company's infrastructure to propagate the malware further to three other organizations. LAC said it also found references to TreadStone and StoneV5 in the RevivalStone campaign, with the former being a controller that's designed to work with the Winnti malware and which was also included in the I-Soon (aka Anxun) leak of last year in connection with a Linux malware control panel. "If TreadStone has the same meaning as the Winnti malware, it is only speculation, but StoneV5 could also mean Version 5, and it is possible that the malware used in this attack is Winnti v5.0," researchers Takuma Matsumoto and Yoshihiro Ishikawa said. "The new Winnti malware has been implemented with features such as obfuscation, updated encryption algorithms, and evasion by security products, and it is likely that this attacker group will continue to update the functions of the Winnti malware and use it in attacks." The disclosure comes as Fortinet FortiGuard Labs detailed a Linux-based attack suite dubbed SSHDInjector that's equipped to hijack the SSH daemon on network appliances by injecting malware into the process for persistent access and covert actions since November 2024. The malware suite, associated with another Chinese nation-state hacking group known as Daggerfly (aka Bronze Highland and Evasive Panda), is engineered for data exfiltration, listening for incoming instructions from a remote server to enumerate running processes and services, perform file operations, launch terminal, and execute terminal commands.

Daily Brief Summary

NATION STATE ACTIVITY // Winnti APT41 Targets Japanese Firms in RevivalStone Espionage Campaign

Winnti, linked to China, targeted Japanese companies in manufacturing, materials, and energy via its RevivalStone campaign in March 2024.

The campaign was identified by Japanese cybersecurity firm LAC and is associated with global espionage efforts linked to the APT41 group.

The attacks leveraged SQL injection vulnerabilities to install web shells and Winnti malware for data theft and persistent access.

Recent tactics include exploiting enterprise resource planning (ERP) systems, using stealth to avoid detection and establishing remote access.

The group specifically used enhanced versions of malware like China Chopper and Winnti, with features like obfuscation and enhanced encryption.

Winnti has expanded its reach by compromising a managed service provider (MSP), using the MSP's infrastructure to target additional firms.

The campaign also hinted at the use of new malware versions (Winnti v5.0) and tools named TreadStone and StoneV5, indicating evolving threat tactics.

Another Chinese group, Daggerfly, was also mentioned for a separate Linux-based attack strategy, emphasizing ongoing nation-state cyber threats.