Earth Baku APT Hackers Group Upgraded Its Hacking Toolset for New Cyberespionage

The cybersecurity researchers of Trend Micro have recently detected a campaign that has been initiated by the APT threat actor group Earth Baku. According to the security experts, this group has been targetting organizations in the Indo-Pacific region.

Soon after detecting this campaign, the security analysts have conducted a strong investigation to know about the threat actor team and their operation, however, it also has been cleared that the threat actor is initiating attacks since July 2020.

Victim Profile

Since this malicious campaign is targetting the organizations in the Indo-Pacific region, so, it has been cleared that the APT threat actor team Earth Baku has targetted the entities in the following sector:-

  • Airline
  • Computer hardware
  • Automotive
  • Infrastructure
  • Publishing
  • Media
  • IT industries

After investigating the attack, the cybersecurity researchers came to know that all the victims are specifically registered from the following countries:-

  • India
  • Indonesia
  • Malaysia
  • The Philippines
  • Taiwan
  • Vietnam

New tools

Earth Baku applies the earlier unidentified parts of malware in this specific campaign, that’s why the tools have been modified in this campaign that is mentioned below:-

The loaders: StealthVector and StealthMutant

The payloads: ScrambleCross and Cobalt Strike beacon

Attack vectors

In this particular campaign, the APT threat actors of Earth Baku has used several methods so that they can easily enter into the system and then effortlessly implement their operations.

However, we have mentioned all the different means that were being used by the threat actors to enter and infect a target system:-

  • Injection of an SQL script into the system’s Microsoft SQL Server for uploading a malicious file.
  • The exploitation of the Microsoft Exchange Server ProxyLogon vulnerability CVE-2021-26855 for uploading a malicious web shell.
  • Potential distribution via emails carrying malicious attachments.
  • Use of the installer application InstallUtil.exe in a scheduled task.

Attribution

This campaign is linked with one of the earlier campaigns that have been conducted by the Earth Baku, and that campaign was performing all its planned tasks under the alias APT41.

That’s why the experts have attributed the new campaign with the old campaign to find the similarities, and here we have mentioned them below:-

  • Initially, both the campaigns use the installer script named install.bat.
  • Another one is that the shellcode loaders of both campaigns have the identical dynamic link library (DLL), Storesyncsvc.dll, and relevant methods for loading APIs.
  • Both the campaigns payloads implement comparable methods for signature checking as well as decoding their central functions.

Moreover, there are many findings that are yet to know, that’s why the researchers are trying their best to know all the details regarding this attack.

Follow us on LinkedinTwitterFacebook for daily Cybersecurity News & Updates

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files to…

13 hours ago

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences Center…

13 hours ago

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a typically…

15 hours ago

Hitachi Authentication Bypass Vulnerability Allows Attackers to Hack the System Remotely

Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer. A…

18 hours ago

ConnectOnCall Data Breach, 900,000 Customers Data Exposed

 The healthcare communication platform ConnectOnCall, operated by ConnectOnCall.com, LLC, has confirmed a significant data breach…

18 hours ago

Kali Linux 2024.4 Released – What’s New!

Kali Linux has unveiled its final release for 2024, version Kali Linux 2024.4, packed with…

18 hours ago