Cyber Security News

Winnti Hackers Attacking Japanese Organisations with New Malware

The China-based Advanced Persistent Threat (APT) group known as the Winnti Group, also referred to as APT41, has launched a new cyberattack campaign targeting Japanese organizations in the manufacturing, materials, and energy sectors.

Dubbed “RevivalStone,” this campaign employs a novel version of the infamous Winnti malware, showcasing enhanced capabilities and sophisticated evasion techniques.

Relationship between APT41 and the Winnti Group

The attack was first identified in March 2024 by LAC’s Cyber Emergency Center and has since been analyzed in detail.

The findings were presented at prominent cybersecurity conferences, including Virus Bulletin 2024 and the Threat Analyst Summit 2024.

RevivalStone Campaign

The RevivalStone campaign begins with exploiting SQL injection vulnerabilities in web-facing ERP systems.

Through this entry point, attackers deploy web shells such as “China Chopper,” “Behinder,” and “sqlmap file uploader” to establish initial access.

These tools facilitate reconnaissance, credential harvesting, and lateral movement within the targeted networks.

Once inside, the attackers deploy an updated version of the Winnti malware.

This advanced malware includes a rootkit for stealthy persistence and uses encrypted communication channels to avoid detection.

The attackers also leveraged compromised accounts from managed service providers (MSPs) to infiltrate interconnected networks, amplifying the campaign’s impact across multiple organizations.

Enhanced Malware Capabilities

The new variant of Winnti malware observed in RevivalStone incorporates several advanced features:

  • Encryption Improvements: The malware employs AES and ChaCha20 encryption algorithms for securing its payloads and communications.
  • Device-Specific Decryption Keys: Unique identifiers such as IP addresses and MAC addresses are used to generate decryption keys, complicating analysis.
  • Rootkit Deployment: The malware installs a kernel-level rootkit to intercept TCP/IP communications, enabling covert data exfiltration.
  • Evasion Techniques: Obfuscated code and DLL hijacking techniques are used to bypass endpoint detection and response (EDR) systems.

The Winnti Group has a long history of cyberespionage campaigns aligned with Chinese state interests.

Winnti malware execution flow

Their activities often target intellectual property and sensitive data across industries such as gaming, pharmaceuticals, aerospace, and now critical infrastructure in Japan.

The group’s use of stolen digital certificates and advanced persistence mechanisms underscores its sophistication.

This campaign demonstrates the growing threat posed by state-sponsored cyber actors targeting supply chains and critical infrastructure.

Organizations are urged to strengthen their cybersecurity defenses by patching vulnerabilities, monitoring for indicators of compromise (IoCs), and implementing robust access controls.

As cyber threats evolve, it is crucial for businesses to adopt multi-layered security strategies to mitigate risks associated with advanced APT campaigns like RevivalStone.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Threat Actors in Russia, China, and Iran Targeting Local communities in the U.S

Foreign adversaries, including Russia, China, and Iran, are intensifying their efforts to manipulate public opinion…

4 minutes ago

New Phishing Attacks Abuses Webflow CDN & CAPTCHAs to Steal Credit Card details

Netskope Threat Labs has uncovered a sophisticated phishing campaign targeting users across various industries, including…

9 minutes ago

30,000 WordPress Sites Exposed to Exploitation via File Upload Vulnerability

A critical security vulnerability in the "Security & Malware scan by CleanTalk" plugin has left…

16 minutes ago

Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks

A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software (CVE-2024-0012)…

18 minutes ago

Widespread Exploitation of ThinkPHP and OwnCloud Flaws by Cybercriminals

 GreyNoise has detected a significant surge in exploitation activity targeting two vulnerabilities — CVE-2022-47945 and…

51 minutes ago

Windows 11 Compression Features Pose libarchive Security Threats

Microsoft's ongoing efforts to enhance user experience in Windows 11 have introduced native support for…

1 hour ago