Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Chinese and North Korean hackers are targeting global infrastructure with ransomware
Global Security

Chinese and North Korean hackers are targeting global infrastructure with ransomware

AdminBy AdminJuly 8, 2024No Comments4 Mins Read
Ransomware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 26, 2024Information hallCyber ​​attack / malware

Ransomware

Criminals with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting government and critical infrastructure sectors around the world between 2021 and 2023.

While one activity cluster was associated with ChamelGang (aka CamoFei), the second cluster overlaps with activities previously attributed to Chinese and North Korean state-sponsored groups, cybersecurity firms SentinelOne and Recorded Future said in a joint report shared with The Hacker News.

This includes the ChamelGang attacks targeting the All India Institute of Medical Sciences (AIIMS) and the President of Brazil in 2022 using CatB extortionistsas well as those aimed at state structure in East Asia and aviation organization in the Indian subcontinent in 2023.

Cyber ​​security

“Threat entities in the cyberespionage ecosystem are engaging in an increasingly alarming trend of using ransomware as the final stage of their operations for financial gain, disruption, distraction, misappropriation or removal of evidence,” – security researchers Alexander Milenkoski and Julian – said Ferdinand Voegele.

Ransomware attacks in this context not only provide an outlet for sabotage, but also allow threat actors to cover their tracks by destroying artifacts that might otherwise alert defenders to their presence.

ChamelGang, documented for the first time is estimated by Positive Technologies in 2021 to be a Chinese-affiliated group operating with motives as diverse as intelligence gathering, data theft, financial gain, denial-of-service (DoS) attacks, and information operations. respectively Taiwanese cybersecurity firm TeamT5.

It is known to have a wide range of tools in its arsenal, including BeaconLoader, Cobalt Strike, backdoors such as AukDoor and DoorMe, and a strain of ransomware known as CatB, which has been identified as being used in attacks targeting Brazil and India, based on common features in the ransom note, contact email address format, cryptocurrency wallet address and file name extension of encrypted files.

Attacks observed in 2023 also used an updated version of BeaconLoader to launch Cobalt Strike for reconnaissance and post-exploitation activities such as tool-dropping and exfiltration NTDS.dit database file.

Additionally, it’s worth noting that the custom malware used by ChamelGang, such as DoorMe and MGDrive (whose macOS variant is called Gimmick), have also been linked to other Chinese threat groups such as REF2924 and A storm cloudhinting again at the possibility of “digital quartermaster providing individual operational groups with malicious programs.”

Another set of intrusions involves the use of Jetico’s BestCrypt and Microsoft’s BitLocker in cyberattacks affecting various industry verticals in North America, South America and Europe. It is believed that 37 organizations, mostly in the US manufacturing sector, were victims of the attacks.

The observed tactics of the two cyber security companies are as follows consistent with those attributed to a Chinese hacking group duplicated APT41 and the North Korean actor known as Andarieldue to the availability of tools such as the China Chopper web shell and a backdoor known as DTrack.

Cyber ​​security

“The activity we observed is consistent with past intrusions using artifacts associated with suspected Chinese and North Korean APT clusters,” Milenkoski told The Hacker News, saying that visibility restrictions likely prevented detection of the malicious artifacts themselves.

“Our investigations and our review of previous research found no evidence of tools or other intrusion artifacts associated with suspected Chinese or North Korean APT groups concurrently present in the same target environments.”

SentinelOne went on to say that it cannot rule out the possibility that these actions are part of a broader cybercriminal scheme, especially given that nation-state actors are also took part Art financially motivated attacks from time to time.

“Cyber ​​espionage operations disguised as ransomware activities enable adversary countries to claim plausible deniability by attributing actions to independent cybercriminal actors rather than state-sponsored actors,” the researchers said.

“The use of ransomware by cyber espionage threat groups blurs the lines between cyber crime and cyber espionage, giving adversaries both strategic and operational advantages.”

(The story was updated after publication to include a response from SentinelOne.)

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025

Ottokit WordPress plugin with 100K+ Instals Hit Gratoits, focused on several disadvantages

May 7, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.