Friday, January 24, 2025
HomeCyber AttackChinese Panda APT Hacking Websites To Infect Windows And MacOS Users

Chinese Panda APT Hacking Websites To Infect Windows And MacOS Users

Published on

SIEM as a Service

Follow Us on Google News

Evasive Panda dubbed BRONZE HIGHLAND and Daggerfly, a Chinese-speaking APT group operating since at least 2012, has been spotted conducting cyberespionage targeting individuals in mainland China, Hong Kong, Macao, and Nigeria. 

Southeast and East Asian governments, notably those in China, Macao, Myanmar, the Philippines, Taiwan, and Vietnam, were the targets of attacks. The targets included other Chinese and Hong Kong groups.

Since 2020, Evasive Panda has been capable of using adversary-in-the-middle attacks to spread its backdoors by obtaining updates from legitimate software.

“The group uses its own custom malware framework with a modular architecture that allows its backdoor, known as MgBot, to receive modules to spy on its victims and enhance its capabilities,” ESET researchers shared with Cyber Security News.

Specifics Of The Cyberespionage Campaign

Since September 2023, Tibetans have been the victims of a cyberespionage campaign that was uncovered.

It used a supply-chain compromise to distribute trojanized installers of software that translated Tibetan language and a targeted watering hole, also known as a strategic web compromise. 

The hijacked website being used as a watering hole is owned by the Kagyu International Monlam Trust, an Indian organization that spreads Tibetan Buddhism worldwide.

Timeline of events related to the attack

The attackers intended to use malicious downloaders for macOS and Windows to infect website users with MgBot and a backdoor known as Nightdoor. 

MgBot, which is used exclusively by Evasive Panda, can provide attackers with a significant amount of information about compromised machines.

Nightdoor was first discovered in 2020, the Google Drive API or UDP is the two ways the backdoor and its C&C server can communicate.

First, the attackers installed a script on the website that checks the IP address of the possible victim and, if it falls within one of the targeted addresses.

The script sends an HTTP request to determine whether the attacker’s intermediary downloader is currently operating on the possible victim’s computer.

The implant responds on a previously hacked system with handleCallback({“success”:true }).

JavaScript code that checks in with the implant

Subsequently, it displays a fake error page that convinces the user to download a “fix” called certificate (which, depending on the operating system, ends in.exe for Windows or.pkg for macOS). 

A fake graphic rendered by the JavaScript

Depending on the user’s operating system, a script that downloads a payload is triggered when they click the “Immediate Fix” button.

Researchers suspect that at the time, the attackers took advantage of the Monlam festival that was scheduled to take place in January and February of 2024 to compromise individuals who visited the website that had turned into a watering hole.

The attackers deployed a number of downloaders, droppers, and backdoors, such as Nightdoor, the most recent significant addition to the group’s toolkit, which has been used to target multiple networks in East Asia.

With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Android Kisok Tablets Vulnerability Let Attackers Control AC & Lights

A startling security flaw found in Android-based kiosk tablets at luxury hotels has exposed...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Android Kisok Tablets Vulnerability Let Attackers Control AC & Lights

A startling security flaw found in Android-based kiosk tablets at luxury hotels has exposed...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...