Tuesday, March 21, 2023
AI Home Security
No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
No Result
View All Result
Morning News
No Result
View All Result
Home Cyber Security

Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection

justmattg by justmattg
January 24, 2023
in Cyber Security
0
Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

READ ALSO

New ‘Bad Magic’ Cyber Threat Disrupt Ukraine’s Key Sectors Amid War

Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority


Jan 24, 2023Ravie LakshmananCyber Espionage / Golang

Golang Malware in DragonSpark Attacks

Organizations in East Asia are being targeted by a likely Chinese-speaking actor dubbed DragonSpark while employing uncommon tactics to go past security layers.

“The attacks are characterized by the use of the little known open source SparkRAT and malware that attempts to evade detection through Golang source code interpretation,” SentinelOne said in an analysis published today.

A striking aspect of the intrusions is the consistent use of SparkRAT to conduct a variety of activities, including stealing information, obtaining control of an infected host, or running additional PowerShell instructions.

The threat actor’s end goals remain unknown as yet, although espionage or cybercrime is likely to be the motive. DragonSpark’s ties to China stem from the use of the China Chopper web shell to deploy malware – a widely used attack pathway among Chinese threat actors.

Furthermore, not only do the open source tools used in the cyber assaults originate from developers or companies with links to China, the instructure for staging the payloads are located in Taiwan, Hong Kong, China, and Singapore, some of which belong to legitimate businesses.

The command-and-control (C2) servers, on the other hand, are situated in Hong Kong and the U.S., the cybersecurity firm said.

Golang Malware

Initial access avenues entail compromising internet-exposed web servers and MySQL database servers to drop the China Chopper web shell. The foothold is then leveraged to carry out lateral movement, privilege escalation, and malware deployment using open source tools like SharpToken, BadPotato, and GotoHTTP.

Also delivered to the hosts are custom malware capable of executing arbitrary code and SparkRAT, a cross-platform remote access trojan that can run system commands, manipulate files and processes, and siphon information of interest.

Another malware of note is the Golang-based m6699.exe, which interprets at runtime the source code contained within it so as to fly under the radar and launch a shellcode loader that’s engineered to contact the C2 server for fetching and executing the next-stage shellcode.

“Chinese-speaking threat actors are known to frequently use open source software in malicious campaigns,” the researchers concluded.

“Since SparkRAT is a multi-platform and feature-rich tool, and is regularly updated with new features, we estimate that the RAT will remain attractive to cybercriminals and other threat actors in the future.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Related Posts

New ‘Bad Magic’ Cyber Threat Disrupt Ukraine’s Key Sectors Amid War
Cyber Security

New ‘Bad Magic’ Cyber Threat Disrupt Ukraine’s Key Sectors Amid War

March 21, 2023
Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority
Cyber Security

Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority

March 21, 2023
55 Zero-Day Vulnerabilities Weaponized in 2022
Cyber Security

55 Zero-Day Vulnerabilities Weaponized in 2022

March 21, 2023
Crypto Drainers Are Ready to Ransack Investor Wallets
Cyber Security

Cybersecurity Threats Overhyped or Not?

March 21, 2023
New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads
Cyber Security

New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads

March 20, 2023
Shouldering the Increasingly Heavy Cloud Shared-Responsibility Model
Cyber Security

Shouldering the Increasingly Heavy Cloud Shared-Responsibility Model

March 20, 2023
Next Post
FBI Says North Korean Hackers Behind $100 Million Horizon Bridge Crypto Theft

FBI Says North Korean Hackers Behind $100 Million Horizon Bridge Crypto Theft

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

February 13, 2023
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

February 11, 2023
The New Threats to Cryptocurrency Users

The New Threats to Cryptocurrency Users

February 12, 2023
Do you know who is watching you?

Do you know who is watching you?

January 2, 2023
PopID announces big customer deployment for face biometric payments in UAE

PopID announces big customer deployment for face biometric payments in UAE

February 14, 2023

EDITOR'S PICK

ADT will let you manage Google Nest products in its updated app

ADT will let you manage Google Nest products in its updated app

January 3, 2023
Unpatched Security Flaws Disclosed in Multiple Document Management Systems

Unpatched Security Flaws Disclosed in Multiple Document Management Systems

February 9, 2023
Application of biometric face identification technologies in financial institutions

Application of biometric face identification technologies in financial institutions

February 5, 2023
Foolproof security arrangements in place for Bharat Jodo Yatra in Haryana: State home minister

Foolproof security arrangements in place for Bharat Jodo Yatra in Haryana: State home minister

January 2, 2023

About

We bring you the best news & updates related to Home security, Cyber security and Biometric technology. Keep visiting our website for latest updates.

Follow us

Categories

  • Biometric Technology
  • Cyber Security
  • Home Security

Recent Posts

  • New ‘Bad Magic’ Cyber Threat Disrupt Ukraine’s Key Sectors Amid War
  • Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority
  • Exploring transformers for behavioral biometrics
  • 55 Zero-Day Vulnerabilities Weaponized in 2022
  • Privacy Policy
  • Contact Us

© 2023 AI Home Security - All rights reserved.

No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology

© 2023 AI Home Security - All rights reserved.