Tuesday, April 16, 2024

Chinese APT Group Attacks India and Hong Kong With New Variant of MgBot Malware & Android RAT

Chinese state-sponsored hacking group targets India and Hong Kong with a unique phishing attack designed to convince the target.

The campaign uses multiple documents with the filename ‘Mail security check’ and “Boris Johnson Pledges to Admit 3 Million From Hong Kong” in the attack.

The document with the name ‘Mail security check’ targets India and the document with “Boris Johnson Pledges to Admit 3 Million From Hong Kong” targeting Hongkong.

According to Malwarebytes analysis, this new campaign is operated by a Chinese state-sponsored actor, who has been active since at least 2014.

Spear-Phishing to Install MgBot Malware

The campaigns found to be active since July 2, in the first campaign attacker group uses the Cobalt Strike variant delivered through a weaponized word document.

A day after the first attack the APT group changed their template to drop, a loader called MgBot that make use of Application Management (AppMgmt) Service on Windows to deliver the final payload.

The campaigns targeting Hong Kong spotted On July 5, the email includes, “with an embedded document borrowing a statement about Hong Kong from UK’s prime minister Boris Johnson.”

The MgBot malware includes four files which two of them are in Chinese Simplified language, which indicates the campaign is operated from China.

The malware includes several anti-analysis and anti-virtualization techniques to make analysis harder and tries to avoid running in a known virtualized environment.

Also, the malware checks for the presence of security products on the victim’s machine, if present them it alters the execution flow.

According to Malwarebytes analysis, the APT group several IP addresses for its C2 communications, and most of the IP addresses are located in Hong Kong.

Android RAT

Researchers found “found several malicious Android applications we believe are part of the toolset used by this APT group.”

The malicious application includes following RAT functionalities;

  • Recording screen and audio using the phone’s camera/mic
  • Locating phone with coordinates
  • Stealing phone contacts, call log, SMS, web history
  • Sending SMS messages

The RAT communicates with a range of IP addresses between to 179, all of them located in Hong Kong.

“The lures used in this campaign indicate that the threat actor may be targeting the Indian government and individuals in Hong Kong, or at least those who are against the new security law issued by China.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Also Read

Digital Strike!! India Banned 59 Chinese Apps Including TikTok, UC Browser, SHAREit

Chinese Bank Forced Companies Doing Business in China to install Malware Embed Tax Software


Latest articles

Hacker Customize LockBit 3.0 Ransomware to Attack Orgs Worldwide

Cybersecurity researchers at Kaspersky have uncovered evidence that cybercriminal groups are customizing the virulent...

Microsoft .NET, .NET Framework, & Visual Studio Vulnerable To RCE Attacks

A new remote code execution vulnerability has been identified to be affecting multiple Microsoft...

LightSpy Hackers Indian Apple Device Users to Steal Sensitive Data

The revival of the LightSpy malware campaign has been observed, focusing on Indian Apple...

LightSpy Malware Attacking Android and iOS Users

A new malware known as LightSpy has been targeting Android and iOS users.This sophisticated...

This Startup Aims To Simplify End-to-End Cybersecurity, So Anyone Can Do It

The Web3 movement is going from strength to strength with every day that passes....

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles