Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » APT41 penetrates the networks of Italy, Spain, Taiwan, Turkey and the UK
Global Security

APT41 penetrates the networks of Italy, Spain, Taiwan, Turkey and the UK

AdminBy AdminJuly 19, 2024No Comments4 Mins Read
APT41 Hackers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 19, 2024Information hallCyber ​​espionage / threat intelligence

APT41 hackers

Several organizations operating in the global shipping and logistics, media and entertainment, technology and automotive sectors in Italy, Spain, Taiwan, Thailand, Turkey and the UK have been targeted in a “sustained campaign” by the prolific Chinese company APT41 hacker group.

“APT41 has successfully penetrated and maintained sustained unauthorized access to multiple victim networks since 2023, allowing them to mine sensitive data over an extended period,” Google-owned Mandiant said. said in a new report released Thursday.

The threat intelligence firm described the controversial group as unique among China’s Nexus actors for using “non-public malware that is typically intended for espionage operations in activities that appear to be outside the scope of state-sponsored missions.”

Attack chains include the use of web shells (ANTSWORD and BLUEBEAM), custom droppers (DUSTPAN and DUSTTRAP), and public tools (SQLULDR2 and PINEGROVE) to achieve persistence, deliver additional payloads, and steal interesting data.

The web shells act as a conduit to load the DUSTPAN (aka StealthVector) dropper, which is responsible for loading the Cobalt Strike Beacon for command and control (C2) communications, followed by the deployment of the DUSTTRAP dropper after lateral movement.

Cyber ​​security

DUSTTRAP, on the other hand, is configured to decrypt a malicious payload and execute it in memory, which in turn contacts an attacker-controlled server or compromised Google Workspace account in an attempt to hide its malicious activity.

Google said the discovered Workspace accounts have been patched to prevent unauthorized access. However, it is not known how many accounts were affected.

The intrusions are also characterized by the use of SQLULDR2 to export data from Oracle databases to a local text file and PINEGROVE to transfer large amounts of sensitive data from compromised networks by abusing Microsoft OneDrive as an output vector.

It should be noted here that the malware families that Mandiant tracks as DUSTPAN and DUSTTRAP match the codenamed families DodgeBox and MoonWalkrespectively, Zscaler ThreatLabz.

APT41 hackers

“DUSTTRAP is a multi-level plug-in framework with multiple components,” the Mandiant researchers said, adding that at least 15 plugins have been identified that are capable of executing shell commands, performing file system operations, listing and terminating processes, recording keystrokes and screenshots, collecting system information and modifying the Windows registry.

It is also designed to verify remote hosts, perform Domain Name System (DNS) lookups, list remote desktop sessions, download files, and perform various manipulations with Microsoft Active Directory.

“The DUSTTRAP malware and related components seen during the intrusion were signed with what are believed to be stolen code signing certificates,” the company said. “One of the code signing certificates appears to have been linked to a South Korean company operating in the gaming industry sector.”

GhostEmperor returns to Haunt

The disclosure comes after Israeli cybersecurity firm Sygnia revealed details of a cyber attack campaign orchestrated by a sophisticated China-Nexus threat group called GhostEmperor deliver the Demodex rootkit variant.

The exact method used to hack the targets is currently unclear, although the group has previously been observed exploiting known flaws in Internet programs. Initial access facilitates the execution of a Windows batch script that removes the archive file (CAB) to finally run the main implant module.

The implant is equipped to manage C2 communications and install the Demodex kernel rootkit using an open source project called Cheat Engine to bypass Windows Driver Signature Enforcement (DSE) mechanism.

“GhostEmperor uses a multi-stage malware to achieve stealthy execution and persistence and uses multiple methods to thwart the analysis process,” said security researcher Dor Nizar said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.