{"id":8941,"date":"2022-06-27T08:50:37","date_gmt":"2022-06-27T08:50:37","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=8941"},"modified":"2022-06-27T08:50:37","modified_gmt":"2022-06-27T08:50:37","slug":"chinese-hackers-and-espionage","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/chinese-hackers-and-espionage\/","title":{"rendered":"Chinese Hackers Use Ransomware As a Cover for Espionage"},"content":{"rendered":"<h4>Secureworks experts have found that Chinese hackers from two groups that specialize in espionage and theft of intellectual property from Japanese and Western companies use ransomware to hide their actions.<\/h4>\n<p>Let me remind you that we also wrote that <a href=\"\/blogs\/chinese-hacker-group-revealed-after-a-decade-of-undetected-espionage\/\">Chinese Hacker Group Revealed after a Decade of Undetected Espionage<\/a>, and also that <a href=\"\/blogs\/follina-0-day-vulnerability\/\">Chinese Hackers Attack <b>0-day Follina<\/b> Vulnerability<\/a>.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.secureworks.com\/research\/bronze-starlight-ransomware-operations-use-hui-loader\" rel=\"noopener nofollow\">Analysts write<\/a> that the use of ransomware in spying campaigns allows hiding traces, complicate the attribution of attacks and distracts the attention of IT specialists of the victim company. In addition, in this way the theft of confidential information is disguised as financially motivated attacks.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/Bronze-Starlight-Attack.jpg\" alt=\"Chinese hackers and espionage\" title=\"\"><\/p>\n<p>A similar disguising method is practiced by <b>Bronze Riverside<\/b> (<b>APT41<\/b>) and <b>Bronze Starlight<\/b> (<b>APT10<\/b>). Both use the HUI loader to deploy remote access Trojans, <b>PlugX<\/b>, <b>Cobalt Strike<\/b>, and <b>QuasarRAT<\/b>.<\/p>\n<p>Starting in March 2022, the Bronze Starlight group used Cobalt Strike to deploy ransomware (including <b>LockFile<\/b>, <b>AtomSilo<\/b>, <b>Rook<\/b>, <b>Night Sky<\/b>, and <b>Pandora<\/b>) on their victims&#8217; networks, according to researchers. These attacks also used a new version of the HUI loader, which is able to intercept Windows API calls and disable Event Tracing for Windows (ETW) and Antimalware Scan Interface (AMSI).<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">Based on the order in which these ransomware families emerged from mid-2021, the attackers likely developed LockFile and AtomSilo first and then moved on to Rook, Night Sky and Pandora.<span class=\"su-quote-cite\">experts say.<\/span><\/div><\/div>\n<p>Studying the configuration of Cobalt Strike beacons in three different attacks using AtomSilo, Night Sky, and Pandora malware revealed a common control server address for them. It is also noted that this year the same source was used to upload samples of the HUI bootloader on <b>Virus Total<\/b>.<\/p>\n<p>It is noted that in the studied cases, the activity of LockFile, AtomSilo, Rook, Night Sky and Pandora was unusual when compared with ordinary financially motivated ransomware attacks. So, the attacks were aimed at a small number of victims, lasted a short period of time, and then the hackers completely abandoned the project and moved on to the next one.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/Attack-Data.jpg\" alt=\"Chinese hackers and espionage\" title=\"\"><\/p>\n<p><b>Secureworks<\/b> writes that Pandora and the latest version of the HUI loader have code similarities. LockFile and AtomSilo also look similar, while Night Sky, Pandora, and Rook are based on the <b>Babuk<\/b> malware source code, but also have a lot in common.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/Malware-Features.jpg\" alt=\"Chinese hackers and espionage\" title=\"\"><\/p>\n<p>Experts summarize that Bronze Starlight clearly has no difficulty creating short-lived ransomware variants that are only needed to disguise spying operations as ransomware attacks and complicate attribution. The fact is that the studied ransomware is based on publicly available or leaked source code, and Chinese hackers are known for willingly sharing tools and infrastructure with each other. That is, in such cases it is extremely difficult to track attribution, possible connections, and speak with confidence about any conclusions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secureworks experts have found that Chinese hackers from two groups that specialize in espionage and theft of intellectual property from Japanese and Western companies use ransomware to hide their actions. Let me remind you that we also wrote that Chinese Hacker Group Revealed after a Decade of Undetected Espionage, and also that Chinese Hackers Attack [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8949,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[434,55],"class_list":{"0":"post-8941","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cobalt-strike","9":"tag-ransomware"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/Chinese-hackers-and-espionage.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/8941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=8941"}],"version-history":[{"count":1,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/8941\/revisions"}],"predecessor-version":[{"id":8948,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/8941\/revisions\/8948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/8949"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=8941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=8941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=8941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}