Chinese state-sponsored hacking group targets India and Hong Kong with a unique phishing attack designed to convince the target.
The campaign uses multiple documents with the filename ‘Mail security check’ and “Boris Johnson Pledges to Admit 3 Million From Hong Kong” in the attack.
According to Malwarebytes analysis , this new campaign is operated by a Chinese state-sponsored actor, who has been active since at least 2014.
The campaigns found to be active since July 2, in the first campaign attacker group uses the Cobalt Strike variant delivered through a weaponized word document.
A day after the first attack the APT group changed their template to drop, a loader called MgBot that make use of Application Management (AppMgmt) Service on Windows to deliver the final payload.
The campaigns targeting Hong Kong spotted On July 5, the email includes, “with an embedded document borrowing a statement about Hong Kong from UK’s prime minister Boris Johnson.”
The MgBot malware includes four files which two of them are in Chinese Simplified language, which indicates the campaign is operated from China.
Also, the malware checks for the presence of security products on the victim’s machine, if present them it alters the execution flow.
According to Malwarebytes analysis, the APT group several IP addresses for its C2 communications, and most of the IP addresses are located in Hong Kong.
Researchers found “found several malicious Android applications we believe are part of the toolset used by this APT group.”
The malicious application includes following RAT functionalities;
The RAT communicates with a range of IP addresses between 188.8.131.52 to 179, all of them located in Hong Kong.
“The lures used in this campaign indicate that the threat actor may be targeting the Indian government and individuals in Hong Kong, or at least those who are against the new security law issued by China.”
Digital Strike!! India Banned 59 Chinese Apps Including TikTok, UC Browser, SHAREit
Chinese Bank Forced Companies Doing Business in China to install Malware Embed Tax Software
- Packet Fingerprinting with Wireshark and Detecting NMap Scans cvv sites, cvv store
- Кандидат в президенты США рассказал о своем хакерском прошлом cvvstore, valid cc shop
- Ransomware Attacks Targeting Unpatched EOL SonicWall SMA 100 VPN Appliances buy cvv, feshop cc
- European Banking Authority victim in Microsoft Exchange Server hack dump shop, buying cvv
- Starting an InfoSec Career – The Megamix – Chapter 6 cvv dump, credit card dumps
Recent CommentsNo comments to show.