Monday, October 14, 2024
HomeCloudChinese APT Infrastructure Mimics Cloud Backup Services

Chinese APT Infrastructure Mimics Cloud Backup Services

Published on

Malware protection

Cambodian government entities were discovered to be targeted and compromised by Chinese APT actors.

The threat actors are using the infrastructure to masquerade as a cloud backup service. The infrastructure also exhibits several malicious nature and persistent connections.

China has recently invested in a project to modernize Cambodia’s Ream Naval base, which was initially stopped by both countries. This created a controversy among the Western Nations. 

- Advertisement - SIEM as a Service

Chinese APT Mimics Cloud Backup

A malicious SSL certificate was found to be used by six facing IP addresses, each of which had several host domains linked with six domains.

On further analyzing the names of the domains, they were found to be masquerading as cloud storage services. 

Since these domains provide a sense of legitimacy to their names, they draw an unusual amount of traffic during high levels of activities like data exfiltration from the victim network.

Source: Palo Alto Unit 42
Source: Palo Alto Unit 42

Nearly 24 Cambodian government organizations were found to be regularly communicating with this infrastructure between September and October 2023.

Document
Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

These organizations provide critical services, which include National Defense, Election oversight, Human rights, National treasury and finance, Commerce, Politics, Natural resources, and Telecommunications.

Golden Week in China

Further investigating the infrastructure, the threat actor was found to be doing their activities between 8:30 and 17:30 UTC +08:00 (China Standard Time) on Weekdays (Mon to Fri). There is also a suspicion that the threat actor is trying to blend in with Cambodian business hours.

However, the threat actor’s activity between September 29 and October 8, 2023, confirmed that the threat actor is based out of China.

China’s Golden Week starts on September 29 and ends on October 6, 2023, whereas Oct 7 and 8 are designated as “Special Working Days”. These days were aligned with low amounts of activity through the week of Oct. 2-8 from the threat actor confirmed the suspicion.

Source: Palo Alto Unit 42
Source: Palo Alto Unit 42

A complete report about the threat actors’ activities has been published, providing detailed information about the compromise, Cambodian government entities, and other information.

Indicators of Compromise

Domains

  • api.infinitycloud[.]info
  • connect.infinitycloud[.]info
  • ns.infinitycloud[.]info
  • connect.infinitybackup[.]net
  • ns1.infinitybackup[.]net
  • share.infinitybackup[.]net
  • file.wonderbackup[.]com
  • login.wonderbackup[.]com
  • sync.wonderbackup[.]com
  • update.wonderbackup[.]com
  • ads.teleryanhart[.]com
  • mfi.teleryanhart[.]com
  • dfg.ammopak[.]site
  • fwg.ammopak[.]site
  • jlp.ammopak[.]site
  • kwe.ammopak[.]site
  • lxo.ammopak[.]site
  • connect.clinkvl[.]com

Infrastructure IP Addresses

  • 165.232.186[.]197
  • 167.71.226[.]171
  • 104.248.153[.]204
  • 143.110.189[.]141
  • 172.105.34[.]34
  • 194.195.114[.]199

SSL Certificate SHA-1 Fingerprint

  • B8CFF709950CFA86665363D9553532DB9922265C

Secures your storage & backup systems With StorageGuard – Watch a 40-second Video Tour.

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...

pac4j Java Framework Vulnerable to RCE Attacks

A critical security vulnerability has been discovered in the popular Java framework pac4j. The...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...