Monday, April 28, 2025
HomeCyber AttackChinese Winnti Group Intensifies Financially Motivated Attacks

Chinese Winnti Group Intensifies Financially Motivated Attacks

Published on

SIEM as a Service

Follow Us on Google News

Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential of monetizing the stolen data, ransoms, and fraudulent activities.

The digital revolution of businesses has invented more openings to exploit financial transactions and access sensitive financial information.

AttackIQ recently unveiled that the Chinese Winnti group intensifies financially motivated attacks.

- Advertisement - Google News

Winnti is an established cyber-espionage and financial-gain group linked to the Chinese government since 2010.

Their healthcare targeting activities were ramped up during COVID-19, with medical research as their main objective.

They are known for supply chain attacks and use ShadowPad which is their signature backdoor, as well as PlugX RAT.

Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot

Winnti’s Operation CuckooBees (2022-05) proceeds in multiple stages. 

Operation CuckooBees stages (Source – AttackIQ)

Here below we have mentioned those stages:- 

  • Malware execution and local discovery post-Webshell deployment, using VBScript for system reconnaissance. 
  • Local credential dumping via registry hive extraction and Mimikatz. 
  • Extensive local and network reconnaissance, gathering detailed system and network information. 
  • Deployment of Winnti malware arsenal, including SpiderLoader and Stashlog. 
  • Additional tooling rollout, involving GUID retrieval, Privatelog deployment via DLL side-loading, lateral movement through RDP, and data exfiltration via HTTP. 

Winnti’s Operation Harvest (2021-09)

Operation Harvest stages (Source – AttackIQ)

Here below we have mentioned them:-

  • PlugX Delivery via RAR file, using DLL side-loading and code injection for execution and persistence. 
  • Local Credential Dumping using Mimikatz. 
  • Winnti Backdoor Deployment, employing RunDLL32 and creating a new service for persistence. 
  • Data Staging, involving extensive system and network discovery. 
  • Data Exfiltration, staging collected data, and exfiltrating via encrypted C2 channel. 

Winnti’s 2022-08 Campaign

Campaign Targeting Government Entities stages (Source – AttackIQ)

This campaign contains multiple stages, and here below we have mentioned them:- 

  • Malware delivery is via DBoxAgent’s ISO file, and files are dropped and executed through DLL side-loading. 
  • Local System Discovery, gathering network and system information for HTTPS exfiltration. 
  • SerialVlogger and KeyPlug Deployment, utilizing DLL side-loading for SerialVlogger execution, conducting system discovery, and deploying KeyPlug malware through code injection.

Each stage employs specific MITRE ATT&CK techniques for system infiltration, reconnaissance, and malware deployment.

Mitigations

There are four critical techniques used by Winnti that need to be focused on:-

  • Scheduled Task abuse, detectable via EDR/SIEM monitoring of specific command lines. Mitigate through auditing and account management. 
  • DLL Side-Loading, identifiable by monitoring uncommon process actions and DLL/PE file events. Mitigate via software updates and developer guidance. 
  • Windows Service manipulation, detectable through specific command line monitoring. Mitigate with endpoint behavior prevention and user account management. 
  • System Binary Proxy Execution (Rundll32/Regsvr32), identifiable by unusual execution patterns. Mitigate using exploit protection. 

Continuous testing with these attack graphs helps improve the security control posture against this Chinese government-linked threat actor.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...