Skip to content

Cyber Security And Bitcoin Blockchain News

The World

  • Lawmakers, SEC Commissioner Slam Chair Gensler for Focusing on Crypto Enforcement – Regulation Bitcoin News bitcoin news
  • Bitcoin Price Stuck In Key Range, Why Dips Might Be Limited bitcoin news
  • AVAX Rebounds on Tuesday, AAVE up Over 10% – Market Updates Bitcoin News bitcoin news
  • Bitcoin Recovers Above $30,000, Has The Bottom Been Marked? bitcoin news
  • Crypto Traders Lost $421 Million In Liquidations For The Past 24 Hours bitcoin news
  • Rich Dad, Poor Dad Author Changes His Mind About Bitcoin? bitcoin news
  • Cardano Spikes as Supporters Anticipate Vasil Hard Fork, Poll Shows ADA Expected to Hit $1 by the End of June – Bitcoin News bitcoin news
  • Critical PHP Vulnerability Exposes QNAP NAS Devices to Remote Attacks cyber security news

Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes

Posted on May 23, 2022 By root


At least two research institutes located in Russia and a third likely target in Belarus have been at the receiving end of an espionage attack by a Chinese nation-state advanced persistent threat (APT).

The attacks, codenamed “Twisted Panda,” come in the backdrop of Russia’s military invasion of Ukraine, prompting a wide range of threat actors to swiftly adapt their campaigns on the ongoing conflict to distribute malware and stage opportunistic attacks.

They have materialized in the form of social engineering schemes with topical war and sanctions-themed baits orchestrated to trick potential victims into clicking malicious links or opening weaponized documents.

Israeli cybersecurity firm Check Point, which disclosed details of the latest intelligence-gathering operation, attributed it a Chinese threat actor, with connections to that of Stone Panda (aka APT 10, Cicada, or Potassium) and Mustang Panda (aka Bronze President, HoneyMyte, or RedDelta).

Calling it a continuation of “a long-running espionage operation against Russian-related entities that has been in operation since at least June 2021,” most recent traces of the activity is said to have been observed as recently as April 2022.

Targets included two defense research institutions belonging to the Russian state-owned defense conglomerate Rostec Corporation and an unknown entity situated in the Belarusian city of Minsk.

The phishing attacks commenced with emails that contain a link masquerading as the Health Ministry of Russia, but in reality is an attacker-controlled domain, as well as a decoy Microsoft Word document designed to trigger the infection and drop a loader.

The 32-bit DLL (“cmpbk32.dll”), besides establishing persistence by means of a scheduled task, is also responsible for executing a second-stage multi-layered loader, which is subsequently unpacked to run the final payload in memory.

The injected payload, a previously undocumented backdoor named Spinner, makes use of sophisticated techniques such as control flow flattening to conceal the program flow, previously identified as put to use by both Stone Panda and Mustang Panda in their attacks.

“These tools are in development since at least March 2021 and use advanced evasion and anti-analysis techniques such as multi-layer in-memory loaders and compiler-level obfuscations,” Check Point said.

CyberSecurity

Despite its complex code structure, Spinner is a barebones implant that’s only equipped to enumerate compromised hosts and run additional payloads retrieved from a remote server.

Check Point noted that its investigation also revealed an earlier variant of the backdoor that’s distributed in a similar fashion, indicating that the campaign has been active since June 2021 based on the compilation timestamps of the executables.

But in an interesting twist, while the older version doesn’t incorporate the anti-reverse engineering methods, it makes up for it by sporting extra features missing from Spinner, including the ability to list and manipulate files, exfiltrate valuable data, and run operating system commands and arbitrary downloaded payloads.

“In less than a year, the actors significantly improved the infection chain and made it more complex,” the researchers said. “All the functionality from the old campaign was preserved, but it was split between multiple components making it harder to analyze or detect each stage.”

“The evolution of the tools and techniques throughout this time period indicates that the actors behind the campaign are persistent in achieving their goals in a stealthy manner.”





TheHackersNews/

cyber security news

Post navigation

Previous Post: Middle East Crypto Exchange Coinmena Enters the Qatari Market, Regulator Says No Institution Licenced – Featured Bitcoin News
Next Post: The Real Work Must Start Now – Op-Ed Bitcoin News

Related Posts

  • Russian Hackers Targeting Diplomatic Entities in Europe, Americas, and Asia cyber security news
  • North Korean Hackers Suspected to be Behind $100M Horizon Bridge Hack cyber security news
  • U.S. Offers $10 Million Bounty for Information on 6 Russian Military Hackers cyber security news
  • New ‘SessionManager’ Backdoor Targeting Microsoft IIS Servers in the Wild cyber security news
  • Thousands of WordPress Sites Hacked to Redirect Visitors to Scam Sites cyber security news
  • New Hertzbleed Side-Channel Attack Affects All Modern AMD and Intel CPUs cyber security news

Archives

  • July 2022
  • June 2022
  • May 2022

Categories

  • bitcoin news
  • cyber security news

Recent Posts

  • SEC Still Against Spot-based Bitcoin ETFs. Is There A Light At The End Of The Tunnel?
  • Demand for Hardware Crypto Wallets Increases Amid Currency Restrictions in Russia – Bitcoin News
  • Cumberland Says Financially Burdened Crypto Firms Are ‘Hanging Over the Market Like a Cloud’ – Bitcoin News
  • Worst Quarterly Bitcoin Crash In A Decade Closes Above Key Support
  • Bitmain Launches 2,400 Megahash E9 Ethereum Miner Ahead of The Merge – Mining Bitcoin News

Recent Comments

No comments to show.
  • Bitcoin Rests Tentatively Above $31,000, Bull Rally Or Trap? bitcoin news
  • Real Demands or False Propositions? bitcoin news
  • LUNA2 Recovers 70% In Nine Days From Historic Lows bitcoin news
  • ViaBTC Capital|The Collapse of LUNA bitcoin news
  • Bitcoin Miners Have Begun Dumping Their Holdings bitcoin news
  • Cardano Vasil Hard Fork On The Horizon, Will ADA React To The Upside? bitcoin news
  • Mastercard to Implement Payments for NFT and Web3 Projects – Bitcoin News bitcoin news
  • President Biden Insists US Recession Is Not Inevitable — Treasury Secretary Yellen Concurs – Bitcoin News bitcoin news

Copyright © 2022 Cyber Security And Bitcoin Blockchain News.

Powered by PressBook News Dark theme