Article Details
Scrape Timestamp (UTC): 2024-06-27 04:20:47.302
Original Article Text
Click to Toggle View
Chinese Cyberspies Employ Ransomware in Attacks for Diversion. Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a financial reward as a secondary goal to data theft. A joint report from SentinelLabs and Recorded Future analysts presents the case of ChamelGang, a suspected Chinese advanced persistent threat (APT) that has been using the CatB ransomware strain in attacks that impact high-profile organizations worldwide. A separate activity cluster uses BestCrypt and Microsoft BitLocker to achieve similar goals, although attribution is not clear. ChamelGang targeting ChamelGang is also known as CamoFei and has targeted government organizations and critical infrastructure entities between 2021 and 2023. The group uses sophisticated techniques to gain initial access, for reconnaissance and lateral movement, and to exfiltrate sensitive data. In an attack in November 2022, the threat actors targeted the Presidency of Brazil and compromised 192 computers. The adversary relied on standard reconnaissance tools to map the network and to gather information on critical systems. In the last stage of the attack, ChamelGang deployed CatB ransomware on the network, dropping ransom notes at the beginning of each encrypted file. They provided a ProtonMail address for contact and a Bitcoin address for payment. The attack was initially attributed to TeslaCrypt but SentinelLabs and Recorded Future present new evidence that point to ChamelGang. During another incident in late 2022, ChamelGang breached the All India Institute Of Medical Sciences (AIIMS) public medical research university and hospital. The threat actor used CatB ransomware once again, causing major disruptions in healthcare services. The researchers believe that two other attacks, against a government entity in East Asia and an aviation organization in the Indian subcontinent are also the work of ChamelGang, based on the use of known TTPs, publicly available tooling seen in previous engagements, and their custom malware BeaconLoader. BestCrypt and BitLocker A separate cluster of activities spotted by SentinelLabs and Recorded Future encrypts files using Jetico BestCrypt and Microsoft BitLocker instead of CatB ransomware. The researchers say that these intrusions impacted 37 organizations, most of them in North America. Other victims were in South America and Europe. By comparing evidence in reports from other cybersecurity companies, the researchers discovered overlaps with past intrusions linked to suspected Chinese and North Korean APTs. Typically, BestCrypt was used to target server endpoints in an automated, serial encryption manner, while BitLocker was deployed against workstations, with unique recovery passwords used in each case. The attackers also used the China Chopper webshell, a custom variant of the miPing tool, and leveraged Active Directory Domain Controllers (DCs) as footholds. The analysts report these attacks lasted for nine days on average, while some had a short duration of just a couple of hours, indicating familiarity with the targeted environment. A reason for involving ransomware in cyberespionage attacks could be that it provides strategic and operational benefits that blur the lines between APT and cybercriminal activity, which can lead to incorrect attribution or as a means to conceal the data collection nature of the operation. Attributing past ransomware incidents to a cyberespionage threat actor as ChamelGang is new and shows that adversaries are changing tactics to cover their tracks while still attaining their goals.
Daily Brief Summary
Chinese cyberespionage groups, specifically ChamelGang, have been leveraging ransomware such as CatB to complicate attack attribution, distract defenders, and occasionally as a secondary revenue source while primarily focusing on data theft.
ChamelGang, also known by names such as CamoFei, has targeted government entities and critical infrastructure sectors from 2021 through 2023, using sophisticated initial access, reconnaissance, lateral movement, and data exfiltration techniques.
Notable attacks include the breach of Brazil’s Presidential computers in November 2022, involving 192 compromised devices and subsequent deployment of CatB ransomware with ransom notes indicating contact and payment methods.
Another significant ChamelGang operation involved an attack on the All India Institute Of Medical Sciences, disrupting healthcare services with the deployment of CatB ransomware.
Separate activity clusters not conclusively attributed employed BestCrypt and Microsoft BitLocker in cyberattacks targeting mostly North American organizations, with some victims in South America and Europe.
These attacks typically lasted about nine days, indicating attackers' familiarity with targeted environments, and involved automated and serial encryption at server endpoints and individualized attacks on workstations.
Cross-analysis with other cybersecurity firms suggests some overlap between these activities and previous intrusions associated with Chinese and North Korean APTs.
The strategic incorporation of ransomware in espionage activities aims to blur the distinction between cybercrime and state-sponsored actions, potentially leading to misattribution and obscuring the primarily espionage-oriented nature of the intrusions.