Russian Organizations in Chinese APT Crosshairs
Overview
SentinelLabs recently reported on a new cluster of activity targeting Russian organizations that they attributed with high-confidence to a Chinese state-sponsored espionage group. This was corroborated by a recent Ukraine CERT advisory (June 22, 2022).
The report highlights recent Chinese intelligence objectives regarding the observation of Russian organizations in the midst of the chaotic conflict in Ukraine. Scarab, Mustang Panda, and Space Pirates campaigns have all been observed and previously reported on but the researchers at SentinelLabs believe their ongoing analysis points to a new, separate campaign being conducted by an unattributed Chinese APT.
Campaign Details
Attribution
- Long history of Russian targeting; increased activity indicates possible increased prioritization
- Documents are built with Royal Road or the 8.t builder - popular tools used by previous Chinese APT groups
- Metadata in the maldocs indicate the creator(s) operating systems to be using simplified Chinese, previously noted in Scarab APT reporting
- Maldocs observed delivering custom malware, like Bisonal RAT. CERT-UA has reported this unique to Chinese groups.
- Lastly, C2 infrastructure indicates overarching Chinese APT activity
Comments
Post a Comment