To predict the target of new Chinese malware, look at the target of new Chinese laws
Black Hat Asia To predict the targets of new Chinese malware, keep an eye on new Chinese government policies, a threat intelligence analyst suggested at the Black Hat Asia conference on Thursday.
In a presentation about an emerging China-nexus modular trojan named “Pangolin8RAT”, Taiwan-based cybersecurity firm TeamT5’s Silvia Yeh noted that attacks on online gambling operators occurred around the same time that China announced action against such outfits.
While Yeh said the timing could be coincidental – gambling and online gaming companies have also historically experienced financially motivated attacks – Pangolin8RAT appears to be a weapon of choice for Chinese state-sponsored cyber operations.
We observed some crackdown campaigns were followed by cyber operations
Yew later told The Register the attacks against foreign gambling firms might also be attempts to collect data for the crackdown campaigns.
“In our opinion, we surmise that the COVID-19 pandemic and China’s crackdown on casinos (ie, crackdown against casinos in Macau) have made the online gambling industry become prosperous. So, these online gambling firms which possess an abundant amount of money and data have become top targets of threat actors,” said Yew to The Reg
“Our opinion is that the Chinese policies will affect the cyber threat landscape in the region as we observed some crackdown campaigns were followed by cyber operations,” added the threat intelligence analyst in an email.
“Pay attention to Chinese policies, they may have an effect on the malware you see in your region,” she said.
Pangolin8RAT is modular malware that emerged in 2019 and is regularly updated. It is believed to be the successor of the PlugX and ShadowPad malware families, and has been used to target industries beyond gambling – transportation, telecom and governments have all been attacked.
TeamT5 believes Pangolin8RAT is likely shared or traded among Chinese threat groups, for attacks aimed at espionage and/or financial gain.
But to date, Pangolin8RAT has mainly been used by one threat entity – the Chinese APT group Team5 has labelled “Tianwu” because its namesake is a mystical creature with eight human heads, eight feet, and eight tails. Team5 feels the malware may be an amalgam of efforts by many different actors.
Team5 hypothesizes the collaborative development process used to create Tianwu may represent a new mode of APT operations. The security company also feels that Tianwu could be a collaborator or subgroup of Chinese attack gang APT41, also known as Amoeba. Or perhaps Tianwu is a supplier of tools and infrastructure to others.
Pangolin8RAT has been used in a targeted fashion, which lends credence to the assertion that it may be used to achieve regulatory or political means. For instance, an attack launched on Kazakhstan’s KZ Telecom may have been used to infiltrate associated carriers across Eurasia, and the threat actors have employed social engineering tactics in forums to lure dissidents into the open.
TeamT5 also found threat actors collected and stored victim credentials, software source code and business info of their victims for future use. However, there also seems to be no consistent target and TeamT5 had difficulty pinning down the threat actor’s motive. ®
via The Register https://ift.tt/OoJBUx9
May 12, 2022 at 10:06PM