Monday, April 28, 2025
HomeMalwareLuckyMouse Chinese APT Malware Launching Weaponized Waterholing Attack on Government Data Center

LuckyMouse Chinese APT Malware Launching Weaponized Waterholing Attack on Government Data Center

Published on

SIEM as a Service

Follow Us on Google News

Chinese APT actor LuckyMouse also known as EmissaryPanda & APT27 campaign targeting government entities and national data center by inserting malicious scripts to compromise an official website and performing Watering hole Attack.

Watering hole Attack is specifically targeting the businesses and organizations group by infecting carefully selected websites and the attackers run exploits on well-known & trusted sites that they targeted audience used to visit regularly.

Attackers main motivation behind this attack is to gain access to the government resource and stealing the sensitive information.

- Advertisement - Google News

Threat actor also using Powerful remote administration tool (RAT) called HyperBro Trojan that is regularly used by a variety of Chinese-speaking actors to create a backdoor.

LuckyMouse already targeted the government entities in central Asia and based on the Watering hole of government websites and the corresponding dates is to access the web pages via the data center and inject JavaScripts into them.

How Does this Watering hole Attack Champaign Works

Initially unknown distribution vector launching the weaponized Microsoft Office Equation Editor documents with CVE-2017-118822 which is widely used by Chinese-speaking actors since December 2017.

In this case, attacker targeting the data center employees by using Watering hole Attack and the C&C  server resolving IP address belongs to Ukrainian ISP network.

This network was controlled by Mikrotik router using firmware version 6.34.4 which was hacked to process the malware’s HTTP requests for this Waterhole champaign.

Once the infection started, this module drops the 3 files and the trojan is injected into svchost.exe’s process memory.

  • a legit Symantec pcAnywhere (IntgStat.exe)
  • a .dll launcher (pcalocalresloader.dll)
  • decompressor (thumb.db)

Malware performing various anti-detection stages which are shown in the above picture that contains three dropped modules.

According to Kaspersky,The websites were compromised to redirect visitors to instances of both ScanBox and BEeF.
                         The script that infected into compromised government websites

Finally, visitors of the infected government website will be redirected and these redirects were implemented by adding two malicious scripts obfuscated by a tool similar to the Dean Edwards packer.

The most unusual and interesting point here is the target. A national data center is a valuable source of data that can also be abused to compromise official websites. Another interesting point is the Mikrotik router, which we believe was hacked specifically for the campaign. Kaspersky researchers said.

Also Read:

Powerful APT Malware “Slingshot” Performs Highly Sophisticated Cyber Attack to Compromise Router

Russia Launch Heavy Cyber Attack on Singapore During Donald Trump & Kim Summit

MuddyWater Malware Attack Launch PowerShell Script to Open Backdoor in Windows PC via MS Word Document

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...

Hannibal Stealer: Cracked Variant of Sharp and TX Malware Targets Browsers, Wallets, and FTP Clients

A new cyber threat, dubbed Hannibal Stealer, has surfaced as a rebranded and cracked...