Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms in 12+ Countries
Global Security

Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms in 12+ Countries

AdminBy AdminNovember 26, 2024No Comments3 Mins Read
GHOSTSPIDER Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


GHOSTSPIDER malware

A China-linked threat actor known as Earth Estries has been spotted using a previously undocumented backdoor called GHOSTSPIDER as part of attacks on Southeast Asian telecommunications companies.

Trend Micro which described hacker group Aggressive Advanced Persistent Threat (APT), said the intrusions also involved the use of another cross-platform backdoor called MASOL RAT (aka Backdr-NQ) on Linux systems belonging to Southeast Asian government networks.

In total, Earth Estries is estimated to have successfully compromised more than 20 organizations spanning the telecommunications, technology, consulting, chemical and transportation industries, government agencies, and the non-profit organization (NGO) sector.

Victims have been identified in more than a dozen countries, including Afghanistan, Brazil, Eswatini, India, Indonesia, Malaysia, Pakistan, the Philippines, South Africa, Taiwan, Thailand, the United States and Vietnam.

Land of Estra shares overlap with clusters tracked by other cybersecurity vendors named FamousSparrow, GhostEmperor, Salt Typhoon, and UNC2286. It is said to have been active since at least 2020, using a wide range of malware families to hack into telecommunications and government organizations in the US, Asia-Pacific, the Middle East and South Africa.

Cyber ​​security

According to A the report As The Washington Post reported last week, the hacking group is believed to have penetrated more than a dozen telecommunications companies in the US alone. About 150 victims have been identified and notified by the US government.

GHOSTSPIDER malware
DEMODEX rootkit infection chain

Some of the known tools in its malware portfolio include Demodex rootkit and Deed RAT (aka SNAPPYBEE), the supposed successor to ShadowPad, which was widely used by several Chinese APT groups. Also used by a threat actor backdoors and information stealers like Crowdoor, SparrowDoor, HemiGate, TrillClient and Zingdoor.

Initial access to target networks is facilitated by exploiting N-day vulnerabilities in Ivanti Connect Secure (CVE-2023-46805 and CVE-2024-21887), Fortinet FortiClient EMS (CVE-2023-48788), Sophos Firewall (CVE- 2022- 3236), Microsoft Exchange Server (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065, aka ProxyLogon).

GHOSTSPIDER malware
GHOSTSPIDER infection flow

The attacks then pave the way for the deployment of custom malware such as Deed RAT, Demodex and GHOSTSPIDER for long-term cyber espionage.

“Earth Estries is a well-organized group with a clear division of labor,” said security researchers Leon M Chang, Theo Chen, Lennart Bermejo and Ted Lee. “Based on observations of several companies, we believe that attacks targeting different regions and industries are carried out by different actors.”

“Furthermore, the (command and control) infrastructure used by the different backdoors appears to be managed by different infrastructure groups, further highlighting the complexity of the group’s operations.”

A complex and multi-module implant, GHOSTSPIDER communicates with attacker-controlled infrastructure using a custom protocol protected by Transport Layer Security (TLS) and receives additional modules that can augment its functionality as needed.

“Earth Estries conducts stealth attacks that start at the edge and spread to cloud environments, making detection challenging,” Trend Micro said.

Cyber ​​security

“They use a variety of techniques to create operational networks that effectively hide their cyber espionage activities, demonstrating a high level of sophistication in their approach to infiltrating and monitoring sensitive targets.”

Telecommunications companies are in the spotlight several China-related threat groups such as Granite typhoon and Liminal panda in recent years.

Cybersecurity firm CrowdStrike told The Hacker News that the attacks highlight the significant maturation of China’s cyber program, which has moved from isolated attacks to mass data collection and longer-term targeting of managed service providers (MSPs), internet service providers (ISPs), and platform providers.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.