Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Pro-China MirrorFace Hackers Target EU Diplomats With Expo 2025 Bait
Global Security

Pro-China MirrorFace Hackers Target EU Diplomats With Expo 2025 Bait

AdminBy AdminNovember 7, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 7, 2024Ravi LakshmananThreat Intelligence / Cyber ​​Espionage

The China-related threats, known as MirrorFace, have been seen targeting a diplomatic organization in the European Union, marking the first time a hacking team has targeted an organization in the region.

“During this attack, the threat actor used the upcoming World Expo 2025 in Osaka, Japan as bait,” ESET said in a statement. said in its report on APT activities for the period April to September 2024.

“This shows that even with the new geographic focus, MirrorFace remains focused on Japan and related events.”

Cyber ​​security

MirrorFace, also tracked as Land of Kashis estimated to be part of an umbrella group known as APT10, which also includes clusters tracked as Earth Tengshe and Bronze Starlight. It has been known to target Japanese organizations since at least 2019, although a new campaign observed in early 2023 expanded its activities to include Taiwan and India.

Over the years, the hacking team’s arsenal of malware has expanded to include backdoors such as SORRY (aka UPPER COTT), LODEINFO and NOOPDOOR (aka HiddenFace), as well as a credential stealer called MirrorStealer.

ESET told The Hacker News that MirrorFace attacks are highly targeted and that there are typically “less than 10 attacks per year.” The ultimate goal of these intrusions is cyber espionage and data theft. However, this is not the first time that diplomatic organizations have been the target of threats.

In the latest attack discovered by a Slovak cyber security company, the victim received a phishing email with a link to a ZIP archive (“Expo in Japan 2025.zip”) located on Microsoft OneDrive.

Image source: Trend Micro

The archive file included a Windows shortcut file (“2025 Japan EXPO.docx.lnk”) which, when run, triggered an infection sequence that eventually deployed ANEL and NOOPDOOR.

“ANEL disappeared from the scene around late 2018 or early 2019, and LODEINFO was believed to have replaced it, appearing later in 2019,” ESET said. “So it’s exciting to see how ANEL is recovering after almost five years.”

The development occurs as a threat to entities associated with China, such as Linen typhoon, Granite typhoonand Web wormwas found to increasingly rely on the open source and multi-platform SoftEther VPN to maintain access to victim networks.

Cyber ​​security

This is also according to a Bloomberg report said associated with China Volt Typhoon breached Singapore Telecommunications (Singtel) as a “test run” of a broader campaign targeting telcos and other critical infrastructure, according to two people familiar with the matter. The cyber intrusion was discovered in June 2024.

US telecommunications and network service providers such as AT&T, Verizon and Lumen Technologies have also become the target of another Chinese national-state competitive team called Salt typhoon (aka FamousSparrow and GhostEmperor).

The Wall Street Journal earlier this week said hackers used these attacks to compromise mobile phone lines used by various high-ranking national security officials, policymakers and politicians in the US. The company is also believed to have penetrated telecommunications providers owned by another country that “closely shares intelligence with the US”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.