Saturday, June 3, 2023
AI Home Security
No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
No Result
View All Result
Morning News
No Result
View All Result
Home Cyber Security

Chinese APT Alloy Taurus Is Back With Retooling

justmattg by justmattg
April 26, 2023
in Cyber Security
0
Everything You Need to Know
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter



After a brief hiatus, the Alloy Taurus APT (aka Gallium or Operation Soft Cell) is back on the scene, with a new Linux variant of its PingPull malware.

Alloy Taurus is a Chinese nation-state-affiliated threat actor, around since at least 2012 but only in the spotlight since 2019. It focuses on espionage, and is best known for targeting major telecommunications providers.

In a blog post last June, Palo Alto Networks’ Unit 42 published details on the original, Windows version of PingPull. It was a Visual C++-based remote access Trojan (RAT), which enabled its proprietor to run commands and access a reverse shell on a compromised target computer.

Alloy Taurus took a hit in the second half of 2022, but now it’s back in full. “They burned the Windows version of PingPull,” explains Pete Renals, principal researcher at Unit 42, “and they’ve spun up a new capability that demonstrates some degree of expertise switching to a different variant.”

The Linux variant largely overlaps with its Windows ancestor, allowing the attackers to list, read, write, copy, rename, and delete files, as well as run commands. Interestingly, PingPull also shares some functions, HTTP parameters, and command handlers with the China Chopper Web shell infamously deployed in the 2021 attacks against Microsoft Exchange Servers.

The Fall of Alloy Taurus

Alloy Taurus burst onto the scene in 2018–2019, with bold espionage campaigns against major telecommunications providers around the world. As Cybereason explained in its then-breaking blog post in June 2019, “the threat actor was attempting to steal all data stored in the active directory, compromising every single username and password in the organization, along with other personally identifiable information, billing data, call detail records, credentials, email servers, geolocation of users, and more.”

Even when compared with other Chinese state-level APTs, it’s “fairly mature and fairly serious,” Renals assesses. “The ability to get into an AT&T or Verizon or Deutsche Telekom, lay low, and change router configs, requires a certain degree of expertise. That’s not your junior varsity team in any way, shape, or form.”

But Alloy Taurus wasn’t invulnerable, as researchers recently discovered.

The group was flying high in late 2021 and early 2022, utilizing its PingPull Windows RAT in multiple campaigns, Unit 42 noted in its June blog post. It targeted telecoms but also military and government organizations, located in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia and Vietnam.

Then, “only three to five days after we published in June, we watched them abandon all their infrastructure that was covered in the report,” Renals says. “They changed everything to point to a specific government and Southeast Asia — so that all the beaconing implants and all the victims got redirected to another country — and they basically wiped their hands of all of it.”

The Return of Alloy Taurus

Alloy Taurus hadn’t disappeared entirely, but it had certainly retreated. “They were living off the land,” Renals explains. “Some of the core upstream infrastructure remained open and running.”

The victory was short-lived when, in December, researchers picked up on new signs of life. And in March, they captured a Linux sample of the old PingPull malware. “It shows a mature APT’s capability to respond and adjust very quickly,” Renals says.

That APTs can so effortlessly return in new forms presents a conundrum for cyber defenders. How does one protect against a group like Alloy Taurus today, if it can simply return wearing new makeup tomorrow?

“I think the days of tracking specific indicators of compromise (IoCs) are largely behind us,” says Renals. “Now it’s more about tracking the techniques and the tactics, and having the behavioral analytics to go detect that kind of activity. That’s where we’re shifting the endpoint, that’s where we’re shifting network security, as well.”

Discovering the new PingPull, he believes, is a case in point for this better way of sussing out sophisticated APTs. “With the Linux variant, we initially may have triaged it as benign. And then we looked at it and said: ‘Hey, wait a minute. This has very similar characteristics to something else that’s malicious. Let’s have a human go look at this.’ So, having that capability is essential.”



Source link

READ ALSO

The Importance of Managing Your Data Security Posture

‘PostalFurious’ SMS Attacks Target UAE Citizens for Data Theft

Related Posts

The Importance of Managing Your Data Security Posture
Cyber Security

The Importance of Managing Your Data Security Posture

June 3, 2023
Undetected Attacks Against Middle East Targets Conducted Since 2020
Cyber Security

‘PostalFurious’ SMS Attacks Target UAE Citizens for Data Theft

June 2, 2023
New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
Cyber Security

New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America

June 2, 2023
Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks
Cyber Security

Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks

June 2, 2023
Malicious PyPI Packages Using Compiled Python Code to Bypass Detection
Cyber Security

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection

June 1, 2023
Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining
Cyber Security

Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining

June 1, 2023
Next Post
Chinese Hackers Spotted Using Linux Variant of PingPull in Targeted Cyberattacks

Chinese Hackers Spotted Using Linux Variant of PingPull in Targeted Cyberattacks

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

February 13, 2023
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

February 11, 2023
Do you know who is watching you?

Do you know who is watching you?

January 2, 2023
The New Threats to Cryptocurrency Users

The New Threats to Cryptocurrency Users

February 12, 2023
PopID announces big customer deployment for face biometric payments in UAE

PopID announces big customer deployment for face biometric payments in UAE

February 14, 2023

EDITOR'S PICK

Microsoft Issues January 2023 Patch Tuesday Updates, Warns of Zero-Day Exploit

Microsoft Issues January 2023 Patch Tuesday Updates, Warns of Zero-Day Exploit

January 16, 2023
Ethics, biometrics and AI: the good, the bad and the ugly – Why European Parliament’s concerns are probably disproportionate

Can we exploit human visual attention to improve face recognition models?

February 4, 2023
Bl00dy Ransomware Gang Strikes Education Sector with Critical PaperCut Vulnerability

Bl00dy Ransomware Gang Strikes Education Sector with Critical PaperCut Vulnerability

May 15, 2023
North Korean Kimsuky Hackers Strike Again with Advanced Reconnaissance Malware

North Korean Kimsuky Hackers Strike Again with Advanced Reconnaissance Malware

May 24, 2023

About

We bring you the best news & updates related to Home security, Cyber security and Biometric technology. Keep visiting our website for latest updates.

Follow us

Categories

  • Biometric Technology
  • Cyber Security
  • Home Security

Recent Posts

  • The Importance of Managing Your Data Security Posture
  • ‘PostalFurious’ SMS Attacks Target UAE Citizens for Data Theft
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks
  • Privacy Policy
  • Contact Us

© 2023 AI Home Security - All rights reserved.

No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology

© 2023 AI Home Security - All rights reserved.