Friday, October 4, 2024
HomeCVE/vulnerabilityChinese Hackers Stay Hidden On Military And Government Networks For Six Years

Chinese Hackers Stay Hidden On Military And Government Networks For Six Years

Published on

Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of critical infrastructure. 

This is mainly because these networks hold sensitive data and command systems that if tampered with can be a great blow to national security through the collection of intelligence information or even gaining an upper hand in times of war.

Bitdefender Labs recently analyzed a chain of cyber-attacks on top-flight organizations in South China Sea countries, revealing a previously unknown threat actor who probably acted at China’s command. 

- Advertisement - EHA

This investigation took several years and involved at least eight military and government victims from 2018, who used different methods and tools, such as Gh0st RAT iterations and .NET payloads, which can be likened to a cyber espionage museum. 

ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service

Technical Analysis

The most unsettling aspect is that attackers repeatedly got back inside systems through weak passwords or failing to update them.

Meanwhile, even after comparing numerous artifacts, it was impossible to determine their over-five-year-long activities, assuming they were made by any known state actors. 

This was a complicated attribution for “Unfading Sea Haze.” As the researchers found no match in their investigation with known actors and due to this they labeled this group as new.

Their emphasis on South China Sea targets and employment of Gh0st RAT variants suggest investigating their Chinese links. 

An APT41 technique involving SharpJSHandler that had some commonalities but no other resemblance indicated shared practices within the Chinese cyber ecosystem.

These hints show an advanced threat actor who may have ties to China. Consequently, more research is needed.

Unfading Sea Haze, however, managed to regain access via spear-phishing emails containing malicious ZIP archives with LNK files posing as documents. 

The second one had long evasion comments while running, checking on and bypassing ESET processes. It was a SerialPktdoor backdoor payload.

More recent ones have replicated Microsoft Defender installation or relied on political themes embedding LNK files for fileless attacks triggered by MSBuild to make it possible to run code completely from remote SMB servers in memory with no traces left behind on victims’ computers. 

This was enabled by the smart use of legitimate tools such as MSBuild to remain hidden.

Persistence was a matter of choosing scheduled tasks that used names from executable files, which the attackers preferred. 

They began with Gh0st RAT versions such as SilentGh0st and InsidiousGh0st for several years before moving to modular forms like FluffyGh0st and leveraging fileless techniques via MSBuild.exe and remote shares. 

The evolution and different variations of the Gh0st RAT (Source – BitDefender)

These included browser data stealers aimed at Chrome, Firefox, Edge, USB, WPD monitoring, and keyloggers. 

Messaging apps were targeted with compression tools for manual data gathering on recent files. 

This is evidenced by exfiltration moving from using DustyExfilTool customized into curl on TLS to FTP over changing frequent credentials assumed to evolve their operational security posture.

All this shows these spies wanted to engage in information collection activities.

Recommendations

Here below we have mentioned all the recommendations:-

  • Vulnerability Management
  • Strong Authentication
  • Proper Network Segmentation
  • Multilayered Defense
  • Network Traffic Monitoring
  • Effective Logging
  • Detection and Response
  • Collaboration and Information Sharing
  • Advanced Threat Intelligence

Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Prince Ransomware Hits UK and US via Royal Mail Phishing Scam

A new ransomware campaign targeting individuals and organizations in the UK and the US...

Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group

Microsoft and the U.S. Department of Justice (DOJ) have successfully dismantled a network of...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system...

Linux Malware perfctl Attacking Millions of Linux Servers

Researchers have uncovered a sophisticated Linux malware, dubbed "perfctl," actively targeting millions of Linux...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new...

CISA Warns of Four Vulnerabilities that Exploited Actively in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has warned about four critical vulnerabilities currently...

North Korean Hackers Attempted To Steal Sensitive Military Data

Diehl Defence anti-aircraft missiles from Baden-Württemberg are successfully intercepting Russian attacks on Kyiv, according...