Wednesday, December 18, 2024
HomeCyber Security NewsGALLIUM APT Hackers Using New Hacking Tool "PingPull" To Attack on Telecom...

GALLIUM APT Hackers Using New Hacking Tool “PingPull” To Attack on Telecom & Government Sectors

Published on

SIEM as a Service

An APT group named GALLIUM has recently been using a new and hard-to-detect remote access trojan named PingPull. The trojan is being identified by the security experts at Unit 42 security firm as a part of their research.

In addition to monitoring several APT groups, unit 42 also monitors its own infrastructure as well. GALLIUM established its reputation by targeting telecommunications companies operating in the following regions:-

  • Southeast Asia
  • Europe
  • Africa

Prime Targets

While the APT group, Gallium state-sponsored hackers are primarily targeting the following sectors with the new “PingPull” RAT:-

- Advertisement - SIEM as a Service
  • Financial institutions
  • Government entities
  • Telecommunications

The following are the countries in which these entities are based:-

  • Australia
  • Russia
  • Philippines
  • Belgium
  • Vietnam
  • Malaysia
  • Cambodia
  • Afghanistan

Supposedly, Gallium is located in China, and it is considered that its target scope in espionage operations aligns with the lures of the country.

PingPull

A threat actor can access a compromised host using PingPull, a Visual C++ application that runs commands and accesses a reverse shell. In PingPull, there are three versions without functional distinction, but each one uses its own set of protocols to communicate with its C2:-

  • ICMP
  • HTTP(S)
  • Raw TCP

There might be different C2 protocols, as actors may deploy the appropriate variant based on preliminary reconnaissance evading specific detection methods/tools associated with the detection of specific networks.

The following command-line options are supported by all three variants:-

  • Enumerate storage volumes (A: through Z:)
  • List folder contents
  • Read File
  • Write File
  • Delete File
  • Read file, convert to hexadecimal form
  • Write file, convert from hexadecimal form
  • Copy file sets the creation, write, and access times to match original files
  • Move file, sets the creation, write, and access times to match original files
  • Create directory
  • Timestomp file
  • Run command via cmd.exe

In order to decrypt these commands, the beacon needs a pair of hardcoded keys in order to decrypt them since they are sent from the C2 in AES-encrypted form.

Recommendations

Here below the cybersecurity researchers have recommended the following mitigations:-

  • PingPull malware is detected by Cortex XDR and protected against it. 
  • PingPull malware is correctly identified as malign by WildFire using its cloud-based threat analysis service. 
  • Make sure to use a robust Antivirus tool set.
  • Domains connected to this group are identified as malicious by advanced URL Filtering and DNS Security.

Moreover, at the moment, the APT group, Galium has also diversified its scope to include a number of key government companies as well as a number of major financial institutions.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...