Friday, November 1, 2024
HomeMalwareChinese Hackers ScanBox Framework To Deploy Malware on Selected Targets

Chinese Hackers ScanBox Framework To Deploy Malware on Selected Targets

Published on

Malware protection

In the South China Sea, Chinese threat actors have targeted wind turbine fleets and Australian government agencies as a means of extortion. A fake Australian media outlet impersonating an Australian news outlet is being used by these people to target select individuals.

It has been discovered that victims who received malicious JavaScript payloads via the ScanBox reconnaissance framework, ended up on the fraudulent site after receiving phishing emails containing enticing lures.

In this campaign, the target audience was people in the following industries and it ran from April to June of this year:-

- Advertisement - SIEM as a Service
  • Australian Government agencies
  • Australian news media organizations
  • Global heavy industry manufacturers
  • Wind turbines in the South China Sea

As reported by the PwC and Proofpoint security researchers, they evaluated that the campaign was intended to be used for cyberespionage purposes. There is a moderate level of confidence in attributing the activity to a group of threat actors from China, that is tracked as part of a group named APT40.

Illicit campaign

Several attacks originating from approx 6 Chinese threat actors have been observed by security analysts in the past which employed ScanBox as a component. 

While there are several pieces of evidence indicating that the toolkit has been deployed at least since 2014, but there is still plenty of doubt to go around.

Here below we have mentioned all the 6 Chinese threat actors:-

  • Red Sylvan (a.k.a. APT3, Gothic Panda)
  • Red Apollo (a.k.a. APT10, Stone Panda)
  • Red Phoenix (a.k.a. APT27, Emissary Panda) 
  • TA423 / Red Ladon (a.k.a. APT40, Leviathan, GADOLINIUM)
  • Red Dev 16 (a.k.a. Evil Eye, Earth Empusa, Poison Carp) 
  • TA413 / White Dev 9 (a.k.a. LuckyCat)

Here, the targets were phished by the threat actors through Gmail and Outlook emails in multiple malicious waves. 

This email was sent by a person pretending to be an employee of an authentic news media outlet “Australian Morning News,” which in reality is a fake media outlet to include and push a link to a malicious website. 

However, to make it more legit, several legitimate news portals were copied and pasted into the site in order to create content for the site.

Despite leading to the same web page and malicious payload in every case, the URLs included individually unique values for each target.

A copy of the ScanBox framework was served to visitors of the fake website via JavaScript execution and a staging module loading process through which they could run their own scans.

Modules

ScanBox framework is comprised of the following modules:-

  • Keylogger
  • Browser plugins
  • Browser fingerprinting
  • Peer connection
  • Security check

As soon as the victim’s machine has been set up with the framework and the chosen plugins have been installed, the attack can begin. As a result, C2 communication is set up and the following information about the victim is sent over the system:-

  • Profile data
  • Technical details
  • Useful information for reconnaissance
  • Useful information for basic espionage

APT40 is a threat actor with a history of attacks that spans enough time for the US Department of Justice to indict members of APT40 in July 2021, based on that attack history.

Among the entities targeted by this threat actor is the energy exploration industry in the South China Sea, as well as defense and healthcare entities in Australia.

Secure Azure AD Conditional Access – Download Free White Paper

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling...