pwshub.com

Novel attack on Windows spotted in Chinese phishing campaign

Chinese web champ Tencent's cloud is being used by unknown attackers as part of a phishing campaign that aims to achieve persistent network access at Chinese entities.

US-based threat detection, investigation and response tools vendor Securonix last week claimed to have "uncovered a covert campaign targeting Chinese-speaking users with Cobalt Strike payloads likely delivered through phishing emails. The attackers managed to move laterally, establish persistence and remain undetected within the systems for more than two weeks."

Securonix threat researchers Den Iuzvyk and Tim Peck wrote that they could not determine the origin of the attack, nor the attack vector. But the pair were able to conclude that it starts with phishing mails that carry compressed Zip files titled "20240739人员名单信息.zip" – which translates to "Personnel list information."

Clicking on that file unpacks an archive that includes a file link titled "违规远程控制软件人员名单.docx.lnk" – "List of people who violated the remote control software regulations"."

Iuzvyk and Peck suggested that the filenames mean the campaign likely targets "specific Chinese related business or government sectors … as they would both employ individuals who follow 'remote control software regulations'."

Whatever the motive, clicking on that link leads to execution of code that runs from within nested directories with names that reference "MACOS."

Several directories down lurk pair of files named dui70.dll and UI.exe.

The latter is a re-named version of a legit Windows executable named LicensingUI.exe – the tool that informs users about software licensing and activation.

"The legitimate file is designed to import several legitimate DLL files, one of which is dui70.dll and should normally reside in C:\Windows\System32. However, thanks to a DLL path traversal vulnerability, any DLL containing the same name can be sideloaded upon the execution of the renamed UI.exe by the LNK file," Securonix's researchers wrote.

The pair could not find reports of a DLL sideloading or hijacking technique involving LicensingUI.exe, so perhaps this is a new tactic.

Once the UI.exe runs, a malicious DLL that is actually an implant for the notorious Cobalt Strike attack toolkit gets to work and injects itself into the Windows binary "runonce.exe." That executable gives the attackers total control over a host.

  • Chinese boffins advocate nuking nearby asteroids – it’s the only way to be sure
  • Chinese broadband satellites may be Beijing's flying spying censors, think tank warns
  • China AI devs use cloud services to game US chip sanctions
  • China's top Office clone copies Microsoft again – with an inconvenient outage

Whoever runs this campaign then deploys several other pieces of nastyware, namely:

  • fpr.exe – Unknown executable;
  • iox.exe – A tool for port forwarding and setting up proxied connections;
  • fscan.exe – A well-known scanner in red teaming for identifying live hosts and open ports. The output file is "result.txt";
  • netspy.exe – A network reconnaissance tool used for capturing network traffic or scanning for network vulnerabilities. The log files are "netspy.log" and "alive.txt";
  • lld.exe – A shellcode loader binary which in our case loaded and executed raw shellcode saved in C:/Windows/Temp/tmp/tmp.log;
  • xxx.txt – Same as tmp.log before it was renamed;
  • tmp.log – A file containing shellcode to be executed by lld.exe;
  • sharpdecryptpwd.exe – A command-line based utility that collects and dumps cached credentials from installed applications such as Navicat, TeamViewer, FileZilla, WinSCP and Xmanager;
  • pvefindaduser.exe – Used for Windows Active Directory (AD) user enumeration;
  • new text document.txt – the researchers were not able to capture this file and its action is unknown;
  • gogo_windows_amd64.exe – Seems related to an open source project "Nemo" which automates enumeration tools such as Nmap, Massscan and many others. Outputs ".sock.lock" and "output.txt" files.

The above were executed in sequence and produced plenty of info the attackers exfiltrated – presumably to inform other attacks.

Securonix observed the attackers establishing persistent access in victim networks, and moving laterally using remote desktop protocol.

Lifting information on Active Directory configuration is one target, public IP addresses is another.

Securonix's researchers wrote that all the IP addresses they observed as having been used in this attack were hosted at Tencent – including in its cloud object storage service. It's not unusual for public clouds to find they have nasty customers, but China's government does not look kindly upon its tech giants when they fail to safeguard the local internet.

The security vendor has named the campaign it spotted SLOW#TEMPEST because whoever runs it is willing to lurk for a week or two in pursuit of their goals.

Threat researchers Iuzvyk and Peck labelled the attacker "highly organized and sophisticated [and] likely orchestrated by a seasoned threat actor who had experience using advanced exploitation frameworks such as CobaltStrike and a wide range of other post-exploitation tools."

"The campaign's complexity is evident in its methodical approach to initial compromise, persistence, privilege escalation and lateral movement across the network."

But Securonix could not find solid evidence linking this attack to any known APT groups.

Most such groups are thought to be affiliated either with China itself, or Russia, or North Korea.

The latter two nations are among Beijng's closest friends. But of course those who count China as a foe could also be very interested in the kind of info this attack targets. ®

Source: theregister.com

Related stories
19 hours ago - Cybersecurity experts at OALabs have uncovered a new attack vector for stealing credentials. The unique method involves launching the user's browser in kiosk mode to a login page (usually Google). Kiosk mode is useful for isolating a...
1 month ago - Plus: More stalkerware exposure; a $16M TracFone fine; Ransomware victims don't use MFA, and more Infosec in brief Protecting computers' BIOS and the boot process is essential for modern security – but knowing it's important isn't the...
1 month ago - And reveals the small mistake that bricked 8.5M Windows boxes CrowdStrike has hired two outside security firms to review the Falcon functionality that sparked a global IT outage last month – but it may not have an awful lot to find,...
1 month ago - Article updated on August 7, 2024 at 7:30 AM PDT Our expert, award-winning staff selects the products we cover and rigorously...
1 month ago - Enlarge / No, you haven't been "AI'd." That's a real crowd. Donald Trump may have coined a new term in his latest false attack on Kamala Harris'...
Other stories
10 minutes ago - Experts at the Netherlands Institute for Radio Astronomy (ASTRON) claim that second-generation, or "V2," Mini Starlink satellites emit interference that is a staggering 32 times stronger than that from previous models. Director Jessica...
10 minutes ago - The PKfail incident shocked the computer industry, exposing a deeply hidden flaw within the core of modern firmware infrastructure. The researchers who uncovered the issue have returned with new data, offering a more realistic assessment...
10 minutes ago - Nighttime anxiety can really mess up your ability to sleep at night. Here's what you can do about it right now.
10 minutes ago - With spectacular visuals and incredible combat, I cannot wait for Veilguard to launch on Oct. 31.
10 minutes ago - Finding the perfect pair of glasses is difficult, but here's how to do so while considering your face shape, skin tone, lifestyle and personality.