Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Experts identify 3 China-linked clusters behind cyberattacks in Southeast Asia
Global Security

Experts identify 3 China-linked clusters behind cyberattacks in Southeast Asia

AdminBy AdminSeptember 10, 2024No Comments4 Mins Read
Cyberattacks in Southeast Asia
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 10, 2024Ravi LakshmananMalware / cyber espionage

Cyberattacks in Southeast Asia

Three China-linked threat clusters have been seen compromising more government organizations in Southeast Asia in a renewed state-sponsored code-named operation Raspberry Palacewhich indicates the expansion of espionage activities.

Cybersecurity firm Sophos, which is tracking the cyberattack, said it consisted of three sets of intrusions, tracked as Cluster Alpha (STAC1248), Cluster Bravo (STAC1870) and Cluster Charlie (STAC1305). STAC is an acronym for “security threat cluster”.

“Attackers consistently used other compromised organizational and public networks in this region to deliver malware and tools under the guise of a trusted access point,” security researchers Mark Parsons, Morgan Demboski and Sean Gallagher said in a technical report shared with The Hacker News.

A notable aspect of the attacks is that they involve the use of an unnamed organization’s systems as a command and control (C2) relay point and staging area for tools. A second organization’s compromised Microsoft Exchange Server is said to have been used to host the malware.

Cyber ​​security

Raspberry Palace bldg first documented by a cybersecurity company in early June 2024, and the attacks took place between March 2023 and April 2024.

While the initial activity associated with the Bravo cluster, which overlaps with a threat group called Unfading sea mistwas limited to March 2023, a new wave of attacks discovered between January and June 2024 targeted 11 other organizations and agencies in the same region.

Cyberattacks in Southeast Asia

A set of new attacks orchestrated by the Charlie cluster, a cluster called Land of Lunchhas also been revealed between September 2023 and June 2024, some of which also involve the deployment of C2 frameworks such as Cobalt Strike, Chaosand XieBroC2 to facilitate post-commissioning and deliver additional payloads, e.g Sharp to reflect the Active Directory infrastructure.

“Exfiltration of data of intelligence value continued to be a goal after operations resumed,” the researchers said. “However, much of their effort appears to have focused on restoring and expanding their position on the target network by bypassing the EDR software and quickly regaining access when their C2 implants were blocked.”

Cyberattacks in Southeast Asia

Another important aspect is Cluster Charlie’s heavy reliance on DLL hijacking to run the malware, an approach previously taken by the threat actors behind Cluster Alpha, which suggests a “cross-pollination” of tactics.

Some of the other open source programs used by the threat actor include RealBlindingEDR and Alcatrazwhich allow you to kill antivirus processes and obfuscate portable executable files (such as .exe, .dll and .sys) to fly under the radar.

Rounding out the cluster’s malware arsenal is a previously unknown keylogger codenamed TattleTale, which was initially identified in August 2023 and is capable of collecting data from Google Chrome and Microsoft Edge browsers.

Cyber ​​security

“The malware can hijack a compromised system and check for mounted physical and network drives while pretending to be a logged-on user,” the researchers explained.

“TattleTale also collects domain controller name and steals LSA (Local Security Authority) request policy information, which is known to contain sensitive information related to password policies, security settings, and sometimes cached passwords.”

In a nutshell, the three clusters work hand-in-hand while focusing on specific tasks in the attack chain: infiltrating the target environment and conducting reconnaissance (Alpha), deep network penetration using various C2 mechanisms (Bravo), and extracting valuable data. (Charlie).

“Throughout the engagement, the enemy appeared to be constantly testing and refining their methods, tools, and practices,” the researchers concluded. “When we deployed countermeasures against their custom malware, they combined the use of their custom-built tools with common open-source tools often used by legitimate penetration testers, testing various combinations.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.