Thursday, April 18, 2024

Chinese Cyber Espionage Group Targeting United States Engineering & Academic Organizations With Advanced Hacking Tools

Chinese cyber espionage actor actively distributing TEMP.Periscope malware campaign that used for set of powerful malware toolkit to compromise U.S Engineering and other  Organizations such as maritime industry, research institutes in the United States.

This malware actively distributing since 2017 along with other Chinese malware campaign but it used various infection approach with a revised toolkit.

This Chinese Cyber Espionage Group Primary focus on earlier stage was multiple targeting vectors including engineering firms, shipping and transportation, manufacturing, defense, government offices, and research universities.

Most number of Identified infected victims by this group from the United States, also Europe and Hong Kong countries affected next to the U.S.

TEMP.Periscope also leveraging a large library of malware that used by other Chinese hacking groups. and its using tactics, techniques, and procedures (TTPs)

Also Read: OceanLotus APT Hacking Group Distributing Backdoor to Compromise Government Networks

List of Large Malware Library From Other Chinese Cyber Espionage Group

  • AIRBREAK  – JavaScript-based backdoor to compromise legitimate services by retrieves commands from hidden strings in compromised web pages.
  • BADFLICK – A Backdoor for generating a reverse shell, modifying the file system.
  • PHOTO –  A DLL backdoor creating a reverse shell to screen captures; recording video and audio.
  • HOMEFRY –  Windows password dumper/cracker using in other backdoor and revealed the password in cleartext credentials.
  • LUNCHMONEY- Dropbox file Exfiltration
  • MURKYTOP – command-line reconnaissance tool to delete files locally,  steal the information  OS, users, groups, and shares on remote hosts.
  • China Chopper: a simple code injection that allows the shell to upload and download files.

Also TEMP.Periscope leverage some of the old past operations and use it again.

  • Beacon –  a backdoor for injecting and executing arbitrary code, uploading and downloading files, and executing shell commands.
  • BLACKCOFFEE: a backdoor that obfuscates its communications
According to FireEye Report, this Chinese Cyber Espionage Group using aditional  TTPs such as,
  • Spear phishing, including the use of probably compromised email accounts.
  • Lure documents using CVE-2017-11882 to drop malware.
  • Stolen code signing certificates used to sign malware.
  • Use of bitsadmin.exe to download additional tools.
  • Use of PowerShell to download additional tools.
  • Using C:\Windows\Debug and C:\Perflogs as staging directories.
  • Leveraging Hyperhost VPS and Proton VPN exit nodes to access webshells on internet-facing systems.
  • Using Windows Management Instrumentation (WMI) for persistence.
  • Using Windows Shortcut files (.lnk) in the Startup folder that invoke the Windows Scripting Host (wscript.exe) to execute a Jscript backdoor for persistence.
  • Receiving C2 instructions from user profiles created by the adversary on legitimate websites/forums such as Github and Microsoft’s TechNet portal.

TEMP.Periscope Primarily focusing to steal research and development data, intellectual property.

Website

Latest articles

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a...

Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control

Security researchers at Cado Security Labs have uncovered a new variant of the Cerber...

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent...

North Korean Hackers Abuse DMARC To Legitimize Their Emails

DMARC is targeted by hackers as this serves to act as a preventative measure...

L00KUPRU Ransomware Attackers discovered in the wild

A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the...

Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities...

Outlook Login Panel Themed Phishing Attack Evaded All Antivirus Detections

Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections.The...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles