Thursday, March 28, 2024

Chinese Hackers ScanBox Framework To Deploy Malware on Selected Targets

In the South China Sea, Chinese threat actors have targeted wind turbine fleets and Australian government agencies as a means of extortion. A fake Australian media outlet impersonating an Australian news outlet is being used by these people to target select individuals.

It has been discovered that victims who received malicious JavaScript payloads via the ScanBox reconnaissance framework, ended up on the fraudulent site after receiving phishing emails containing enticing lures.

In this campaign, the target audience was people in the following industries and it ran from April to June of this year:-

  • Australian Government agencies
  • Australian news media organizations
  • Global heavy industry manufacturers
  • Wind turbines in the South China Sea

As reported by the PwC and Proofpoint security researchers, they evaluated that the campaign was intended to be used for cyberespionage purposes. There is a moderate level of confidence in attributing the activity to a group of threat actors from China, that is tracked as part of a group named APT40.

Illicit campaign

Several attacks originating from approx 6 Chinese threat actors have been observed by security analysts in the past which employed ScanBox as a component. 

While there are several pieces of evidence indicating that the toolkit has been deployed at least since 2014, but there is still plenty of doubt to go around.

Here below we have mentioned all the 6 Chinese threat actors:-

  • Red Sylvan (a.k.a. APT3, Gothic Panda)
  • Red Apollo (a.k.a. APT10, Stone Panda)
  • Red Phoenix (a.k.a. APT27, Emissary Panda) 
  • TA423 / Red Ladon (a.k.a. APT40, Leviathan, GADOLINIUM)
  • Red Dev 16 (a.k.a. Evil Eye, Earth Empusa, Poison Carp) 
  • TA413 / White Dev 9 (a.k.a. LuckyCat)

Here, the targets were phished by the threat actors through Gmail and Outlook emails in multiple malicious waves. 

This email was sent by a person pretending to be an employee of an authentic news media outlet “Australian Morning News,” which in reality is a fake media outlet to include and push a link to a malicious website. 

However, to make it more legit, several legitimate news portals were copied and pasted into the site in order to create content for the site.

Despite leading to the same web page and malicious payload in every case, the URLs included individually unique values for each target.

A copy of the ScanBox framework was served to visitors of the fake website via JavaScript execution and a staging module loading process through which they could run their own scans.

Modules

ScanBox framework is comprised of the following modules:-

  • Keylogger
  • Browser plugins
  • Browser fingerprinting
  • Peer connection
  • Security check

As soon as the victim’s machine has been set up with the framework and the chosen plugins have been installed, the attack can begin. As a result, C2 communication is set up and the following information about the victim is sent over the system:-

  • Profile data
  • Technical details
  • Useful information for reconnaissance
  • Useful information for basic espionage

APT40 is a threat actor with a history of attacks that spans enough time for the US Department of Justice to indict members of APT40 in July 2021, based on that attack history.

Among the entities targeted by this threat actor is the energy exploration industry in the South China Sea, as well as defense and healthcare entities in Australia.

Secure Azure AD Conditional Access – Download Free White Paper

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles