Sunday, October 6, 2024
HomeCyber AttackEarth Baku APT Hackers Group Upgraded Its Hacking Toolset for New...

Earth Baku APT Hackers Group Upgraded Its Hacking Toolset for New Cyberespionage

Published on

The cybersecurity researchers of Trend Micro have recently detected a campaign that has been initiated by the APT threat actor group Earth Baku. According to the security experts, this group has been targetting organizations in the Indo-Pacific region.

Soon after detecting this campaign, the security analysts have conducted a strong investigation to know about the threat actor team and their operation, however, it also has been cleared that the threat actor is initiating attacks since July 2020.

Victim Profile

Since this malicious campaign is targetting the organizations in the Indo-Pacific region, so, it has been cleared that the APT threat actor team Earth Baku has targetted the entities in the following sector:-

- Advertisement - EHA
  • Airline
  • Computer hardware
  • Automotive
  • Infrastructure
  • Publishing
  • Media
  • IT industries 

After investigating the attack, the cybersecurity researchers came to know that all the victims are specifically registered from the following countries:-

  • India
  • Indonesia
  • Malaysia
  • The Philippines
  • Taiwan
  • Vietnam

New tools

Earth Baku applies the earlier unidentified parts of malware in this specific campaign, that’s why the tools have been modified in this campaign that is mentioned below:-

The loaders: StealthVector and StealthMutant

The payloads: ScrambleCross and Cobalt Strike beacon

Attack vectors

In this particular campaign, the APT threat actors of Earth Baku has used several methods so that they can easily enter into the system and then effortlessly implement their operations.

However, we have mentioned all the different means that were being used by the threat actors to enter and infect a target system:-

  • Injection of an SQL script into the system’s Microsoft SQL Server for uploading a malicious file.
  • The exploitation of the Microsoft Exchange Server ProxyLogon vulnerability CVE-2021-26855 for uploading a malicious web shell.
  • Potential distribution via emails carrying malicious attachments.
  • Use of the installer application InstallUtil.exe in a scheduled task.

Attribution

This campaign is linked with one of the earlier campaigns that have been conducted by the Earth Baku, and that campaign was performing all its planned tasks under the alias APT41.

That’s why the experts have attributed the new campaign with the old campaign to find the similarities, and here we have mentioned them below:-

  • Initially, both the campaigns use the installer script named install.bat.
  • Another one is that the shellcode loaders of both campaigns have the identical dynamic link library (DLL), Storesyncsvc.dll, and relevant methods for loading APIs.
  • Both the campaigns payloads implement comparable methods for signature checking as well as decoding their central functions.

Moreover, there are many findings that are yet to know, that’s why the researchers are trying their best to know all the details regarding this attack.

Follow us on Linkedin, Twitter, Facebook for daily Cybersecurity News & Updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Prince Ransomware Hits UK and US via Royal Mail Phishing Scam

A new ransomware campaign targeting individuals and organizations in the UK and the US...

Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group

Microsoft and the U.S. Department of Justice (DOJ) have successfully dismantled a network of...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system...

Linux Malware perfctl Attacking Millions of Linux Servers

Researchers have uncovered a sophisticated Linux malware, dubbed "perfctl," actively targeting millions of Linux...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Prince Ransomware Hits UK and US via Royal Mail Phishing Scam

A new ransomware campaign targeting individuals and organizations in the UK and the US...

Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group

Microsoft and the U.S. Department of Justice (DOJ) have successfully dismantled a network of...

Linux Malware perfctl Attacking Millions of Linux Servers

Researchers have uncovered a sophisticated Linux malware, dubbed "perfctl," actively targeting millions of Linux...