An APT group named GALLIUM has recently been using a new and hard-to-detect remote access trojan named PingPull. The trojan is being identified by the security experts at Unit 42 security firm as a part of their research.
In addition to monitoring several APT groups, unit 42 also monitors its own infrastructure as well. GALLIUM established its reputation by targeting telecommunications companies operating in the following regions:-
While the APT group, Gallium state-sponsored hackers are primarily targeting the following sectors with the new “PingPull” RAT:-
The following are the countries in which these entities are based:-
Supposedly, Gallium is located in China, and it is considered that its target scope in espionage operations aligns with the lures of the country.
A threat actor can access a compromised host using PingPull, a Visual C++ application that runs commands and accesses a reverse shell. In PingPull, there are three versions without functional distinction, but each one uses its own set of protocols to communicate with its C2:-
There might be different C2 protocols, as actors may deploy the appropriate variant based on preliminary reconnaissance evading specific detection methods/tools associated with the detection of specific networks.
The following command-line options are supported by all three variants:-
In order to decrypt these commands, the beacon needs a pair of hardcoded keys in order to decrypt them since they are sent from the C2 in AES-encrypted form.
Here below the cybersecurity researchers have recommended the following mitigations:-
Moreover, at the moment, the APT group, Galium has also diversified its scope to include a number of key government companies as well as a number of major financial institutions.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL injection…
A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution, which…
Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing two…
Cybersecurity researchers have detected the active exploitation of a zero-day vulnerability in GeoVision devices, which…
A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…