Skip to content

Cyber Security And Bitcoin Blockchain News

The World

  • GameFi Project ArchLoot Provides NFT User Builder for Creative Playability – Press release Bitcoin News bitcoin news
  • Tether Launches on Polygon, USDT Stablecoin Now Hosted on 11 Blockchain Networks – Altcoins Bitcoin News bitcoin news
  • While Stocks Rebound, Analysts Discuss Bitcoin’s Decoupling, Gold Markets Remain ‘Under Pressure’ – Finance Bitcoin News bitcoin news
  • Sequel to Iconic RPG Ni No Kuni to Feature NFT Integration and Play-to-Earn Mechanics – News Bitcoin News bitcoin news
  • The Liquidifty Platform Breaks the Borders and Create New Opportunities for Creators bitcoin news
  • Experts Detail 3 Hacking Teams Working Under the Umbrella of TA410 Group cyber security news
  • Researchers Find New Malware Attacks Targeting Russian Government Entities cyber security news
  • Cosmos Climbs 15%, as AAVE Nears a 10-Day High – Market Updates Bitcoin News bitcoin news

Chinese Hackers Caught Stealing Intellectual Property from Multinational Companies

Posted on May 4, 2022 By root


Operation CuckooBees

An elusive and sophisticated cyberespionage campaign orchestrated by the China-backed Winnti group has managed to fly under the radar since at least 2019.

Dubbed “Operation CuckooBees” by Israeli cybersecurity company Cybereason, the massive intellectual property theft operation enabled the threat actor to exfiltrate hundreds of gigabytes of information.

Targets included technology and manufacturing companies primarily located in East Asia, Western Europe, and North America.

“The attackers targeted intellectual property developed by the victims, including sensitive documents, blueprints, diagrams, formulas, and manufacturing-related proprietary data,” the researchers said.

“In addition, the attackers collected information that could be used for future cyberattacks, such as details about the target company’s business units, network architecture, user accounts and credentials, employee emails, and customer data.”

Winnti, also tracked by other cybersecurity vendors under the names APT41, Axiom, Barium, and Bronze Atlas, is known to be active since at least 2007.

“The group’s intent is towards theft of intellectual property from organizations in developed economies, and with moderate confidence that this is on behalf of China to support decision making in a range of Chinese economic sectors,” Secureworks notes in a threat profile of the actor.

The multi-phased infection chain documented by Cybereason involves the exploitation of internet-facing servers to deploy a web shell with the goal of conducting reconnaissance, lateral movement, and data exfiltration activities.

It’s both complex and intricate, following a “house of cards” approach in that each component of the killchain depends on other modules in order to function, rendering analysis exceedingly difficult.

Operation CuckooBees

“This demonstrates the thought and effort that was put into both the malware and operational security considerations, making it almost impossible to analyze unless all pieces of the puzzle are assembled in the correct order,” the researchers explained.

The data harvesting is facilitated by means of a modular loader called Spyder, which is used to decrypt and load additional payloads. Also used are four different payloads — STASHLOG, SPARKLOG, PRIVATELOG, and DEPLOYLOG — that are sequentially deployed to drop the WINNKIT, a kernel-level rootkit.

Crucial to the stealthiness of the campaign is the use of “rarely seen” techniques such as the abuse of Windows Common Log File System (CLFS) mechanism to stash the payloads, enabling the hacking group to conceal their payloads and evade detection by traditional security products.

CyberSecurity

Interestingly, parts of the attack sequence were previously detailed by Mandiant in September 2021, while pointing out the misuse of CLFS to hide second-stage payloads in an attempt to circumvent detection.

The cybersecurity firm attributed the malware to an unknown actor, but cautioned that it could have been deployed as part of a highly targeted activity.

“Because the file format is not widely used or documented, there are no available tools that can parse CLFS log files,” Mandiant said at the time. “This provides attackers with an opportunity to hide their data as log records in a convenient way, because these are accessible through API functions.”

WINNKIT, for its part, has a compilation timestamp of May 2019 and has almost zero detection rate in VirusTotal, highlighting the evasive nature of the malware that enabled the authors to stay undiscovered for years.

The ultimate goal of the intrusions, the researchers assessed, is to siphon proprietary information, research documents, source code, and blueprints for various technologies.

“Winnti is one of the most industrious groups operating on behalf of Chinese state-aligned interests,” Cybereason said. “The threat [actor] employed an elaborate, multi-stage infection chain that was critical to enabling the group to remain undetected for so long.”





TheHackersNews/

cyber security news

Post navigation

Previous Post: El Salvador’s Bitcoin Volcano Bonds Launch Still on Hold, According to Treasury Minister – Bitcoin News
Next Post: BTC, ETH Marginally Higher Ahead of Today’s Rate Decision – Market Updates Bitcoin News

Related Posts

  • Experts Sound Alarm on DCRat Backdoor Being Sold on Russian Hacking Forums cyber security news
  • Microsoft Warns Rise in XorDdos Malware Targeting Linux Devices cyber security news
  • Government Agencies Warned of Increase in Cyberattacks Targeting MSPs cyber security news
  • EU Proposes New Rules for Tech Companies to Combat Online Child Sexual Abuse cyber security news
  • QNAP Advises to Mitigate Remote Hacking Flaws Until Patches are Available cyber security news
  • Researchers Develop RCE Exploit for the Latest F5 BIG-IP Vulnerability cyber security news

Archives

  • May 2022

Categories

  • bitcoin news
  • cyber security news

Recent Posts

  • Sequel to Iconic RPG Ni No Kuni to Feature NFT Integration and Play-to-Earn Mechanics – News Bitcoin News
  • India’s Central Bank RBI to Adopt a ‘Graded Approach’ to Digital Currency Launch – Regulation Bitcoin News
  • Ethereum Slips, What Are The Next Vital Trading Levels For The Coin?
  • We’re Approaching a Recession but It’s ‘Actually a Good Thing’ – Economics Bitcoin News
  • FTX CEO Says Crypto Exchange Is Ready to Spend Billions on Acquisition Deals – Bitcoin News

Recent Comments

No comments to show.
  • As LUNA’s Price Drops Over 33% in 24 Hours, Stablecoin UST Slips Below $1 Parity to $0.93 – Bitcoin News bitcoin news
  • Bitcoin Mining Difficulty Drops 4.33%, Biggest Reduction in 10 Months – Mining Bitcoin News bitcoin news
  • Cryptocurrency Is ‘Based on Nothing,’ Should Be Regulated, ECB’s Lagarde Says – Regulation Bitcoin News bitcoin news
  • What To Stake in 2022: Zilliqa Blockchain in figures bitcoin news
  • DOT, ADA, SHIB Down Under 10%, as WAVES Rallies on Monday – Market Updates Bitcoin News bitcoin news
  • Bitcoin Stable Near $30,000 But The Bearish Leg Is Far From Over bitcoin news
  • STEPN’s GMT Token Supported by Alchemy Pay for Real-World Spending – Press release Bitcoin News bitcoin news
  • Bitcoin Funding Rates Remain Unmoved Despite Plunge To $30,000 bitcoin news

Copyright © 2022 Cyber Security And Bitcoin Blockchain News.

Powered by PressBook News Dark theme