Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Chinese hackers are using Visual Studio code in cyberattacks in Southeast Asia
Global Security

Chinese hackers are using Visual Studio code in cyberattacks in Southeast Asia

AdminBy AdminSeptember 9, 2024No Comments3 Mins Read
Southeast Asian Cyberattacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 9, 2024Ravi LakshmananCyber ​​espionage / malware

Cyberattacks in Southeast Asia

The China-linked Advanced Persistent Threat Group (APT), known as Mustang Panda was seen using Visual Studio Code software as a weapon in espionage operations targeting government entities in Southeast Asia.

“This threat actor used the built-in reverse shell functionality of Visual Studio Code to gain a foothold in the target networks,” said Tom Factorman, a researcher at Division 42 of Palo Alto Networks. said in the report, describing it as a “relatively new technique” that was demonstrated for the first time in September 2023 by Truvis Thornton.

The company is valued as a continuation of a previously documented attack targeting an unnamed Southeast Asian government entity in late September 2023.

Cyber ​​security

Mustang Pandaalso known as BASIN, Bronze President, Camaro Dragon, Earth Preta, HoneyMyte, RedDelta and Red Lich, has been active since 2012 conducting regular cyber espionage campaigns against government and religious organizations across Europe and Asia, particularly those based in Countries of the South China Sea.

The latest observed attack sequence exploits a Visual Studio Code back-shell to execute arbitrary code and deliver additional payloads.

“To abuse Visual Studio Code for malicious purposes, an attacker can use the portable version of code.exe (executable file for Visual Studio Code) or an already installed version of the software,” noted Factorman. “By running the code.exe command tunnel, an attacker receives a link that requires them to log in to GitHub with their account.”

Visual Studio Code

After completing this step, the attacker is redirected to the Visual Studio Code web environment that is connected to the infected machine, allowing them to run commands or create new files.

It should be noted that there have been malicious uses of this technique highlighted earlier mnemonic of the Dutch cybersecurity firm for exploiting a zero-day vulnerability in Check Point’s network security gateway products (CVE-2024-24919, CVSS score: 8.6) earlier this year.

Unit 42 said actor Mustang Panda used the engine to deliver malware, conduct reconnaissance and steal sensitive data. In addition, the attacker is said to have used OpenSSH to execute commands, transfer files and spread across the network.

Cyber ​​security

That’s not all. Closer analysis of the infected environment revealed a second cluster of activity that “occurs simultaneously and sometimes even on the same endpoints” that uses ShadowPad malware, a modular backdoor, widely distributed by Chinese espionage groups.

It is currently unclear whether the two sets of intrusions are related to each other or if two different groups are “mutually accessing each other.”

“Based on the forensic data and the graphics, it was possible to conclude that these two clusters came from the same threat entity (Big Taurus),” Factorman said. “However, there may be other possible explanations for this link, such as a joint effort between two Chinese APT threat actors.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.