Wednesday, December 11, 2024
HomeCyber CrimeChinese Hacker Groups Using Off-The-Shelf Tools To Deploy Ransomware

Chinese Hacker Groups Using Off-The-Shelf Tools To Deploy Ransomware

Published on

SIEM as a Service

Cyberespionage actors are increasingly using ransomware as a final attack stage for financial gain, disruption, or to cover their tracks, as the report details previously undisclosed attacks by a suspected Chinese APT group, ChamelGang, who used CatB ransomware against a major Indian healthcare institution and the Brazilian Presidency in 2022.

ChamelGang also targeted other government and critical infrastructure organizations.

Another intrusion cluster using common encryption tools like BestCrypt and BitLocker hit various industries across North America, South America, and Europe, with a focus on US manufacturing.

- Advertisement - SIEM as a Service

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

While the source of this second cluster is unclear, there are overlaps with past intrusions linked to suspected Chinese and North Korean APT groups. 

BestCrypt & BitLocker targets

Researchers analyzed two APT clusters targeting governments and critical infrastructure sectors globally between 2021 and 2023. One cluster is linked to ChamelGang, a suspected Chinese APT group. 

In 2023, ChamelGang targeted a government organization in East Asia and an aviation organization in the Indian subcontinent, using their known tools and techniques. 

They are also suspected to be behind the 2022 ransomware attacks on the Presidency of Brazil and the All India Institute of Medical Sciences, likely using their CatB ransomware, which is based on overlaps in code, staging mechanisms, and malware artifacts with other ChamelGang intrusions.  

There were intrusions between 2021 and 2023, during which attackers abused legitimate disk encryption tools, Jetico BestCrypt and Microsoft BitLocker, to encrypt victim endpoints for ransom. Thirty-seven organizations, primarily in North America’s manufacturing sector, were affected. 

The attackers leveraged compromised access to deploy the encryption tools, impacting the education, finance, healthcare, and legal sectors as well.

Cyberespionage actors are increasingly using ransomware for more than just financial gain, while the data encryption can destroy forensic artifacts, hindering attribution and deflecting blame. 

Additionally, the urgency of data recovery can distract security teams, allowing further espionage activities to go unnoticed, and this convergence of cybercrime and espionage tactics creates challenges. 

Siloed information sharing between law enforcement (ransomware focus) and intelligence agencies (espionage focus) can lead to missed opportunities to identify threats, assess risks, and maintain a clear understanding of the overall cyber landscape. 

SentinelLabs stresses collaboration on cybercrime/espionage incidents, which includes sharing data, examining artifacts, and analyzing the bigger picture of ransomware attacks by improving the identification of attackers, their goals, and motivations.

They are actively tracking cyberespionage groups that blur the lines between traditional categories and aim to share knowledge to help organizations defend against these threats.

Stay in the loop with the latest in cybersecurity by following us on Linkedin and X for daily updates!

Latest articles

Resecurity introduces Government Security Operations Center (GSOC) at NATO Edge 2024

Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center...

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...