Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Experts identify 3 China-linked clusters behind cyberattacks in Southeast Asia
Global Security

Experts identify 3 China-linked clusters behind cyberattacks in Southeast Asia

AdminBy AdminSeptember 10, 2024No Comments4 Mins Read
Cyberattacks in Southeast Asia
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 10, 2024Ravi LakshmananMalware / cyber espionage

Cyberattacks in Southeast Asia

Three China-linked threat clusters have been seen compromising more government organizations in Southeast Asia in a renewed state-sponsored code-named operation Raspberry Palacewhich indicates the expansion of espionage activities.

Cybersecurity firm Sophos, which is tracking the cyberattack, said it consisted of three sets of intrusions, tracked as Cluster Alpha (STAC1248), Cluster Bravo (STAC1870) and Cluster Charlie (STAC1305). STAC is an acronym for “security threat cluster”.

“Attackers consistently used other compromised organizational and public networks in this region to deliver malware and tools under the guise of a trusted access point,” security researchers Mark Parsons, Morgan Demboski and Sean Gallagher said in a technical report shared with The Hacker News.

A notable aspect of the attacks is that they involve the use of an unnamed organization’s systems as a command and control (C2) relay point and staging area for tools. A second organization’s compromised Microsoft Exchange Server is said to have been used to host the malware.

Cyber ​​security

Raspberry Palace bldg first documented by a cybersecurity company in early June 2024, and the attacks took place between March 2023 and April 2024.

While the initial activity associated with the Bravo cluster, which overlaps with a threat group called Unfading sea mistwas limited to March 2023, a new wave of attacks discovered between January and June 2024 targeted 11 other organizations and agencies in the same region.

Cyberattacks in Southeast Asia

A set of new attacks orchestrated by the Charlie cluster, a cluster called Land of Lunchhas also been revealed between September 2023 and June 2024, some of which also involve the deployment of C2 frameworks such as Cobalt Strike, Chaosand XieBroC2 to facilitate post-commissioning and deliver additional payloads, e.g Sharp to reflect the Active Directory infrastructure.

“Exfiltration of data of intelligence value continued to be a goal after operations resumed,” the researchers said. “However, much of their effort appears to have focused on restoring and expanding their position on the target network by bypassing the EDR software and quickly regaining access when their C2 implants were blocked.”

Cyberattacks in Southeast Asia

Another important aspect is Cluster Charlie’s heavy reliance on DLL hijacking to run the malware, an approach previously taken by the threat actors behind Cluster Alpha, which suggests a “cross-pollination” of tactics.

Some of the other open source programs used by the threat actor include RealBlindingEDR and Alcatrazwhich allow you to kill antivirus processes and obfuscate portable executable files (such as .exe, .dll and .sys) to fly under the radar.

Rounding out the cluster’s malware arsenal is a previously unknown keylogger codenamed TattleTale, which was initially identified in August 2023 and is capable of collecting data from Google Chrome and Microsoft Edge browsers.

Cyber ​​security

“The malware can hijack a compromised system and check for mounted physical and network drives while pretending to be a logged-on user,” the researchers explained.

“TattleTale also collects domain controller name and steals LSA (Local Security Authority) request policy information, which is known to contain sensitive information related to password policies, security settings, and sometimes cached passwords.”

In a nutshell, the three clusters work hand-in-hand while focusing on specific tasks in the attack chain: infiltrating the target environment and conducting reconnaissance (Alpha), deep network penetration using various C2 mechanisms (Bravo), and extracting valuable data. (Charlie).

“Throughout the engagement, the enemy appeared to be constantly testing and refining their methods, tools, and practices,” the researchers concluded. “When we deployed countermeasures against their custom malware, they combined the use of their custom-built tools with common open-source tools often used by legitimate penetration testers, testing various combinations.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025

AI AI agents work on secret accounts – learn how to fasten them in this webinar

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.