Chinese APT Infrastructure Mimics Cloud Backup Services

Cambodian government entities were discovered to be targeted and compromised by Chinese APT actors.

The threat actors are using the infrastructure to masquerade as a cloud backup service. The infrastructure also exhibits several malicious nature and persistent connections.

China has recently invested in a project to modernize Cambodia’s Ream Naval base, which was initially stopped by both countries. This created a controversy among the Western Nations. 

Chinese APT Mimics Cloud Backup

A malicious SSL certificate was found to be used by six facing IP addresses, each of which had several host domains linked with six domains.

On further analyzing the names of the domains, they were found to be masquerading as cloud storage services. 

Since these domains provide a sense of legitimacy to their names, they draw an unusual amount of traffic during high levels of activities like data exfiltration from the victim network.

Source: Palo Alto Unit 42Source: Palo Alto Unit 42
Source: Palo Alto Unit 42

Nearly 24 Cambodian government organizations were found to be regularly communicating with this infrastructure between September and October 2023.

Document
Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

These organizations provide critical services, which include National Defense, Election oversight, Human rights, National treasury and finance, Commerce, Politics, Natural resources, and Telecommunications.

Golden Week in China

Further investigating the infrastructure, the threat actor was found to be doing their activities between 8:30 and 17:30 UTC +08:00 (China Standard Time) on Weekdays (Mon to Fri). There is also a suspicion that the threat actor is trying to blend in with Cambodian business hours.

However, the threat actor’s activity between September 29 and October 8, 2023, confirmed that the threat actor is based out of China.

China’s Golden Week starts on September 29 and ends on October 6, 2023, whereas Oct 7 and 8 are designated as “Special Working Days”. These days were aligned with low amounts of activity through the week of Oct. 2-8 from the threat actor confirmed the suspicion.

Source: Palo Alto Unit 42

A complete report about the threat actors’ activities has been published, providing detailed information about the compromise, Cambodian government entities, and other information.

Indicators of Compromise

Domains

  • api.infinitycloud[.]info
  • connect.infinitycloud[.]info
  • ns.infinitycloud[.]info
  • connect.infinitybackup[.]net
  • ns1.infinitybackup[.]net
  • share.infinitybackup[.]net
  • file.wonderbackup[.]com
  • login.wonderbackup[.]com
  • sync.wonderbackup[.]com
  • update.wonderbackup[.]com
  • ads.teleryanhart[.]com
  • mfi.teleryanhart[.]com
  • dfg.ammopak[.]site
  • fwg.ammopak[.]site
  • jlp.ammopak[.]site
  • kwe.ammopak[.]site
  • lxo.ammopak[.]site
  • connect.clinkvl[.]com

Infrastructure IP Addresses

  • 165.232.186[.]197
  • 167.71.226[.]171
  • 104.248.153[.]204
  • 143.110.189[.]141
  • 172.105.34[.]34
  • 194.195.114[.]199

SSL Certificate SHA-1 Fingerprint

  • B8CFF709950CFA86665363D9553532DB9922265C

Secures your storage & backup systems With StorageGuard – Watch a 40-second Video Tour.

Tushar Subhra

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra ID…

1 day ago

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google…

1 day ago

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by…

1 day ago

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers,…

1 day ago

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features

Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for…

1 day ago

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges

A recent discovery by security researchers at BeyondTrust has revealed a critical, yet by-design, security…

1 day ago