EXECUTIVE SUMMARY
In the second quarter of 2024, Advanced Persistent Threat (APT) groups from China, North Korea, Iran, and Russia demonstrated a surge in dynamic and innovative cyber activities, significantly challenging the global cybersecurity landscape.
Starting with Iran, state-sponsored threat actors exhibited advanced capabilities across various regions and sectors. Void Manticore (Storm-842) targeted Israeli organizations and Albania with destructive attacks and data theft, using custom wipers and web shells. MuddyWater focused on the Middle East, employing spear-phishing and remote monitoring tools to infiltrate the aviation and energy sectors. APT42 (Mint Sandstorm) impersonated journalists to gather intelligence in the US, Europe, and the Middle East, using custom backdoors like TAMECAT and NICECURL, underscoring the persistent and evolving threat from Iranian cyber actors.
Russian threat actors also demonstrated advanced cyber-espionage capabilities. APT28 (Forest Blizzard) targeted Polish government institutions with spear-phishing and DLL side-loading, exploiting CVE-2022-38028. Sandworm (APT44) used the Kapeka backdoor in attacks on Eastern Europe, focusing on ransomware and credential theft. FIN7 (Carbon Spider) expanded its focus from retail and hospitality to defense, insurance, and transportation sectors, deploying the Anunak backdoor via spear-phishing. These activities highlight the sophisticated threats from Russian APT groups, necessitating heightened security measures.
Meanwhile, Chinese state-sponsored threat actors exhibited notable cyber-espionage capabilities. RedJuliett targeted Taiwan and expanded operations to Hong Kong, South Korea, and the US, exploiting network device vulnerabilities to gather intelligence. APT41 (WICKED PANDA) continued its espionage with the resilient KEYPLUG malware on both Windows and Linux platforms. Earth Freybug, a subset of APT41, used DLL hijacking and API unhooking with the UNAPIMON malware to evade detection and conduct sophisticated reconnaissance, emphasizing the persistent and advanced threats from Chinese cyber groups.
Lastly, North Korean cyber threat actors intensified their espionage efforts. Kimsuky (Springtail) targeted South Korea with the new Gomir backdoor and sophisticated social engineering attacks, including the ReconShark malware via Facebook and the TRANSLATEXT Chrome extension. Moonstone Sleet (Storm-1789) engaged in financial and cyber espionage using fake companies, custom ransomware, and trojanized tools. The Lazarus Group used fake job lures to deliver the Kaolin RAT and exploited vulnerabilities for security bypasses. Andariel targeted Korean corporations with advanced RAT malware like Nestdoor and Dora RAT, highlighting North Korea’s persistent and evolving cyber capabilities.
This report provides a comprehensive analysis of the dynamic APT activities observed in Q2 2024, emphasizing the need for ongoing vigilance, user education, and prompt software updates in the ever-evolving cybersecurity landscape.
KEY TRENDS OBSERVED IN Q2 2024
- Iranian APT activities were driven by the motive to advance Iran’s intelligence objectives, particularly those aligned with the Islamic Revolutionary Guard Corps Intelligence Organization (IRGC-IO), by gathering valuable intelligence and influencing decision-making processes to further Iran’s strategic interests in the region.
- Alongside APT28, other threat actors like APT29, MISSION2025, and Stone Panda have also targeted CVE-2022-38028.
- There is a noticeable trend towards the diversification of attack techniques among North Korean APT groups. They are employing sophisticated methods, such as social engineering through platforms like Facebook and leveraging vulnerabilities in widely used applications and protocols.
- Chinese APT groups are exploiting vulnerabilities in firewalls, VPNs, and load balancers globally to initiate attacks. This strategic approach demonstrates their intent to target a wide range of organizations regardless of geographical boundaries, emphasizing a broad-spectrum targeting strategy.
- Chinese threat actors are continuously advancing their tactics, blending sophisticated multi-stage attacks with innovative evasion techniques. Additionally, there’s a notable trend towards developing new, sophisticated malware strains. This dual approach underscores their agility and adaptability in circumventing defenses and maintaining persistence in compromised networks.
IRANIAN APT ACTIVITIES
Targeted Country
- Israel
- Albania
- Turkey
- Azerbaijan
- Jordan
- Saudi Arabia
- United States
- Europe
- Middle East
Targeted Technology
- Windows operating system
- PowerShell
- Microsoft SharePoint
- ScreenConnect
- Atera
- MeshCentral
- Remote Monitoring and Management (RMM) tools
Targeted Industries
- Government
- Finance
- Critical Infrastructure
- NGOs
- Media outlets
- Academia
- Legal services
- Activist groups
- Aviation
- Communications
- Energy
Void Manticore and Scarred Manticore
Void Manticore (aka Storm-842) is an Iranian state-sponsored threat actor notorious for conducting destructive attacks on Israeli organizations and leaking information through the online persona ‘Karma’ (sometimes written as KarMa). Their operations target sectors, such as government, finance, and critical infrastructure, aligning with Iran’s broader offensive strategy. Using straightforward and efficient techniques aimed at causing rapid and significant damage, they extend their attacks beyond Israel to countries like Albania, where they adopt the persona ‘Homeland Justice’ to leak stolen data. In Israel, Void Manticore is notable for using a custom wiper named BiBi, named after Israeli Prime Minister Benjamin Netanyahu. They often gain access to target systems via internet-facing web servers like CVE-2019-0604, deploying web shells, such as the custom “Karma Shell,” which can perform various malicious tasks while being disguised as an error page.
Additionally, they have been seen uploading a custom executable, do.exe, which checks for Domain Admin credentials and installs another web shell, reGeorge, suggesting possible initial access facilitation by another entity (possibly Scarred Manticore, a more sophisticated threat actor). Once inside, Void Manticore uses Remote Desktop Protocol (RDP) for lateral movement and SysInternal’s AD Explorer for network information gathering, establishing command and control (C2) channels using an OpenSSH client. This allows them to control the network environment and prepare for deploying destructive payloads, often using custom wipers that either corrupt specific files or destroy the system’s partition table. Notably, the CI Wiper employs a legitimate driver, ElRawDisk, to wipe files, disks, and partitions, a method seen in other Iran-associated wipers. The collaboration between Void Manticore and Scarred Manticore highlights a sophisticated coordination, enhancing Void Manticore’s effectiveness and reach through advanced capabilities and high-value target access, with their attacks often carrying politically charged messages, as demonstrated by the BiBi wiper.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Execution | T1059 | Command and Scripting Interpreter |
Execution | T1059.003 | Windows Command Shell |
Execution | T1129 | Shared Modules |
Defense Evasion | T1202 | Indirect Command Execution |
Defense Evasion | T1027 | Obfuscated Files or Information |
Defense Evasion | T1036 | Masquerading |
Defense Evasion | T1070 | Indicator Removal |
Defense Evasion | T1070.001 | Clear Windows Event Logs |
Defense Evasion | T1070.004 | File Deletion |
Defense Evasion | T1497 | Virtualization/Sandbox Evasion |
Defense Evasion | T1564 | Hide Artifacts |
Defense Evasion | T1564.003 | Hidden Window |
Credential Access | T1003 | OS Credential Dumping |
Credential Access | T1539 | Steal Web Session Cookie |
Discovery | T1010 | Application Window Discovery |
Discovery | T1057 | Process Discovery |
Discovery | T1082 | System Information Discovery |
Discovery | T1083 | File and Directory Discovery |
Discovery | T1518.001 | Software Discovery: Security Software Discovery |
Collection | T1005 | Data from Local System |
Command and Control | T1071 | Application Layer Protocol |
Command and Control | T1071.001 | Web Protocols |
Impact | T1485 | Data Destruction |
Impact | T1490 | Inhibit System Recovery |
MUDDYWATER
Iran’s MuddyWater APT group has been actively targeting Turkey, Azerbaijan, Jordan, Saudi Arabia, and Israel across diverse economic sectors. Operating under the Iranian Ministry of Intelligence and Security (MOIS) since 2017, MuddyWater has focused extensively on the Middle East, particularly within Israel, using sophisticated Computer Network Exploitation (CNE) tactics. Their methods include employing social engineering techniques, like spear-phishing and exploiting known vulnerabilities to infiltrate networks in sectors such as aviation, academia, communications, government, and energy. The group often utilizes legitimate Remote Monitoring and Management (RMM) tools such as ScreenConnect, Atera, MeshCentral, and Advanced Monitoring Tool. In recently observed campaigns, MuddyWater initiates attacks through phishing emails from various legitimate domains controlled by the attacker. These emails contain links to download compressed files, which disguise malicious or seemingly benign RMM tools. Once activated, these tools enable the attacker to remotely control compromised systems, facilitating activities like file transfers, input device manipulation, and screen capturing. Additionally, the group deploys a C/C++-based tool to inject shellcode into targeted processes like msedge.exe, opera.exe, and powershell.exe, using WinAPI functions, such as VirtualAllocEx, WriteProcessMemory, and CreateRemoteThread to execute their malicious payloads.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Initial Access | T1566.002 | Phishing: Spearphishing Link |
Execution | T1203 | Exploitation for Client Execution |
Privilege Escalation | T1548 | Abuse Elevation Control Mechanism |
Defense Evasion | T1036 | Masquerading |
Defense Evasion | T1548 | Abuse Elevation Control Mechanism |
Defense Evasion | T1562 | Impair Defenses |
Defense Evasion | T1562.001 | Disable or Modify Tools |
Defense Evasion | T1564 | Hide Artifacts |
Defense Evasion | T1564.003 | Hidden Window |
Credential Access | T1003 | OS Credential Dumping |
Credential Access | T1552 | Unsecured Credentials |
Credential Access | T1552.001 | Credentials In Files |
Credential Access | T1555 | Credentials from Password Stores |
Credential Access | T1555.003 | Credentials from Web Browsers |
Discovery | T1012 | Query Registry |
Discovery | T1057 | Process Discovery |
Discovery | T1082 | System Information Discovery |
Collection | T1005 | Data from Local System |
Command and Control | T1071 | Application Layer Protocol |
Command and Control | T1573 | Encrypted Channel |
Impact | T1485 | Data Destruction |
APT42, MINT SANDSTORM
APT42, a notorious cyber espionage group linked to the Iranian state and operating under the alias Mint Sandstorm, has been orchestrating a highly sophisticated social engineering campaign by impersonating journalists to infiltrate networks and gather intelligence, particularly targeting high-profile experts in Middle Eastern affairs. Their operations span strategic regions, including the United States, Israel, Europe, and the Middle East, targeting a diverse range of industries such as NGOs, media outlets, academia, legal services, and activist groups. The attack’s initial phase involves crafting credible journalist personas to establish trust with targets, which is then exploited to gain unauthorized network access. APT42 employs custom backdoors like TAMECAT, a PowerShell toehold for executing arbitrary commands, and NICECURL, a VBScript backdoor for downloading and executing additional modules for data mining and command execution. Their activities are driven by the motive to advance Iran’s intelligence objectives, particularly those aligned with the Islamic Revolutionary Guard Corps Intelligence Organization (IRGC-IO), by gathering valuable intelligence and influencing decision-making processes to further Iran’s strategic interests in the region.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Execution | T1203 | Exploitation for Client Execution |
Defense Evasion | T1036 | Masquerading |
Defense Evasion | T1564 | Hide Artifacts |
Defense Evasion | T1564.003 | Hidden Window |
Credential Access | T1003 | OS Credential Dumping |
Credential Access | T1552 | Unsecured Credentials |
Credential Access | T1552.001 | Credentials In Files |
Credential Access | T1555 | Credentials from Password Stores |
Credential Access | T1555.003 | Credentials from Web Browsers |
Discovery | T1012 | Query Registry |
Discovery | T1082 | System Information Discovery |
Collection | T1005 | Data from Local System |
Command and Control | T1071 | Application Layer Protocol |
Command and Control | T1573 | Encrypted Channel |
Impact | T1485 | Data Destruction |
RUSSIAN APT ACTIVITIES
Targeted Country
- United States
- Europe
- Poland
- Estonia
- Ukraine
Targeted Technology
- Windows Print Spooler service
- Windows
Targeted Industries
- Government
- Automotive Manufacturer
APT28
Forest Blizzard, also known as STRONTIUM (APT28), a Russian-based threat actor, focuses on strategic intelligence gathering to support Russian government foreign policy initiatives. Forest Blizzard employs GooseEgg, a custom post-compromise tool, to gain elevated access to target systems, steal credentials, and facilitate malicious activities, such as remote code execution, installing backdoors, and lateral movement within compromised networks.
The group exploits CVE-2022-38028 (CVSS – 7.8) in the Windows Print Spooler service, using GooseEgg to modify a JavaScript constraints file and execute commands with SYSTEM-level permissions, enabling the launch of arbitrary executables or DLLs with elevated privileges. They manipulate registry keys, create custom protocol handlers, and hijack symbolic links to redirect system processes and execute malicious code. Historically, Forest Blizzard has targeted government, energy, transportation,
NGOs, media, IT, sports organizations, and educational institutions primarily in the United States and Europe. Their activities pose significant risks, including data breaches, credential theft, unauthorized access, and the compromise of sensitive information. The actor’s operations can disrupt functions, compromise network integrity, and facilitate espionage aligned with Russian government interests. Organizations are urged to apply security updates and implement defensive measures to mitigate the threat posed by Forest Blizzard. Alongside APT28, other threat actors like APT29, MISSION2025, and Stone Panda have also targeted CVE-2022-38028. The Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its list of known vulnerabilities, emphasizing the importance of heightened vigilance and collaboration in defending against sophisticated cyber threats.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Execution | T1059 | Command and Scripting Interpreter |
Execution | T1129 | Shared Modules |
Defense Evasion | T1027 | Obfuscated Files or Information |
Defense Evasion | T1112 | Modify Registry |
Discovery | T1033 | System Owner/User Discovery |
Discovery | T1082 | System Information Discovery |
Discovery | T1083 | File and Directory Discovery |
Discovery | T1087 | Account Discovery |
Command and Control | T1071 | Application Layer Protocol |
Another sophisticated cyber-espionage campaign attributed to APT28 and linked to the Russian GRU has been actively targeting Polish government institutions. This campaign employs techniques such as DLL side-loading and executing scripts that download and execute additional payloads, showcasing a high level of technical proficiency and a diverse range of techniques and objectives. APT28’s operations are marked by the use of meticulously crafted spear-phishing emails, which appear legitimate and are personalized for their targets within government agencies. These emails often contain malicious links leading to websites like run[.]mocky[.]io and webhook[.]site, serving as initial entry points for malware delivery. Once the victims click on these links, they inadvertently download a ZIP archive containing malware, disguised as image files, including a Windows Calculator binary masquerading as a JPG image file, along with hidden batch script and DLL files. APT28 utilizes DLL side-loading to load a malicious DLL file while executing a legitimate application, evading detection by security software and allowing it to execute malicious code surreptitiously, thereby compromising the victim’s system. They demonstrate a keen understanding of network evasion tactics, leveraging widely used services like run.mocky.io and webhook[.]site to obscure their activities and reduce the likelihood of detection. Additionally, APT28 employs a multi-stage attack approach with social engineering tactics to maintain the illusion of legitimacy and deceive victims.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Execution | T1059 | Command and Scripting Interpreter |
Defense Evasion | T1036 | Masquerading |
Defense Evasion | T1202 | Indirect Command Execution |
Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools |
Defense Evasion | T1564 | Hide Artifacts |
Defense Evasion | T1564.001 | Hidden Files and Directories |
Defense Evasion | T1564.003 | Hidden Window |
Defense Evasion | T1070 | Indicator Removal |
Credential Access | T1056 | Input Capture |
Credential Access | T1539 | Steal Web Session Cookie |
Discovery | T1082 | System Information Discovery |
Discovery | T1497 | Virtualization/Sandbox Evasion |
Collection | T1056 | Input Capture |
Command and Control | T1071 | Application Layer Protocol |
APT44
A previously undocumented backdoor called Kapeka has been sporadically observed in cyber-attacks targeting Eastern Europe, including Estonia and Ukraine, since mid-2022. Researchers have attributed this malware to the Russia-linked APT group Sandworm (aka APT44 or Seashell Blizzard), with Microsoft tracking it under the name KnuckleTouch. Kapeka is a flexible backdoor that functions as an early-stage toolkit for its operators and provides long-term access to the victim’s systems. It features a dropper designed to launch and execute the backdoor component on the infected host, then remove itself. The dropper sets up persistence for the backdoor, either as a scheduled task or autorun registry, depending on whether the process has SYSTEM privileges. Microsoft noted that Kapeka is involved in multiple campaigns distributing ransomware and can steal credentials and data, conduct destructive attacks, and grant remote access to the device. The backdoor, a Windows DLL written in C++, includes an embedded command-and-control (C2) configuration to establish contact with an actor-controlled server and manage polling frequency for retrieving commands. Masquerading as a Microsoft Word add-in, the backdoor gathers information about the compromised host and uses multi-threading to process instructions and exfiltrate results to the C2 server. It communicates with its C2 using JSON to send and receive information and can update its C2 configuration on the fly. Key features of the backdoor include reading and writing files, launching payloads, executing shell commands, and upgrading or uninstalling itself.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Execution | T1059 | Command and Scripting Interpreter |
Execution | T1129 | Shared Modules |
Defense Evasion | T1027 | Obfuscated Files or Information |
Defense Evasion | T1027.005 | Indicator Removal from Tools |
Defense Evasion | T1112 | Modify Registry |
Defense Evasion | T1140 | Deobfuscate/Decode Files or Information |
Defense Evasion | T1218.011 | System Binary Proxy Execution: Rundll32 |
Defense Evasion | T1222 | File and Directory Permissions Modification |
Defense Evasion | T1497 | Virtualization/Sandbox Evasion |
Discovery | T1012 | Query Registry |
Discovery | T1033 | System Owner/User Discovery |
Discovery | T1057 | Process Discovery |
Discovery | T1082 | System Information Discovery |
Discovery | T1083 | File and Directory Discovery |
Discovery | T1087 | Account Discovery |
Discovery | T1518 | Software Discovery |
Discovery | T1518.001 | Security Software Discovery |
Discovery | T1614 | System Location Discovery |
Collection | T1560 | Archive Collected Data |
Command and Control | T1071 | Application Layer Protocol |
Command and Control | T1573 | Encrypted Channel |
FIN7
FIN7, a Russian advanced persistent threat (APT) group also known as Carbon Spider, ELBRUS, and Sangria Tempest, recently conducted a spear-phishing campaign targeting a US automotive manufacturer. The attackers focused on IT employees with high admin-level rights, luring them with a malicious URL disguised as an IP scanning tool. Upon clicking the link, the Anunak backdoor was deployed, enabling FIN7 to gain an initial foothold using living-off-the-land binaries, scripts, and libraries (lolbas). Historically, FIN7 has targeted the US retail, hospitality, and restaurant sectors, but it is now expanding its focus to the defense, insurance, and transportation sectors. Researchers suggest that FIN7 is likely targeting larger entities, anticipating higher ransom payments.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Initial Access | T1566.002 | Phishing: Spearphishing Link |
Execution | T1204.002 | User Execution: Malicious File |
Execution | T1059.001 | Command and Scripting Interpreter: PowerShell |
Execution | T1569.002 | System Services: Service Execution |
Persistence | T1053.005 | Scheduled Task/Job: Scheduled Task |
Persistence | T1543.003 | Create or Modify System Process: Windows Service |
Defense Evasion | T1027 | Obfuscated Files or Information |
Defense Evasion | T1564.001 | Hide Artifacts: Hidden Files and Directories |
Defense Evasion | T1222.001 | File and Directory Permissions Modification: Windows File and Directory Permissions Modification |
Defense Evasion | T1562.004 | Impair Defenses: Disable or Modify System Firewall |
Discovery | T1124 | System Time Discovery |
Discovery | T1057 | Process Discovery |
Discovery | T1087.002 | Account Discovery: Domain Account |
Discovery | T1069.002 | Permission Groups Discovery: Domain Groups |
Discovery | T1082 | System Information Discovery |
Discovery | T1033 | System Owner/User Discovery |
Lateral Movement | T1021.004 | Remote Services: SSH |
Command-and-Control | T1571 | Non-Standard Port |
Command-and-Control | T1090 | Proxy |
Resource Development | T1608.005 | Stage Capabilities: Link Target |
Resource Development | T1583.001 | Acquire Infrastructure: Domains |
CHINESE APT ACTIVITIES
Targeted Country
- Taiwan
- Hong Kong
- South Korea
- Laos
- United States
- Rwanda
- Kenya
- Djibouti
- Italy
Targeted Industries
- Aerospace
- Education
- Semiconductor
- Manufacturing
- Technology
- Government
Targeted Technology
- Windows
- Linux
REDJULIETT
In Q2 2024, researchers reported that between November 2023 and April 2024, a likely Chinese state-sponsored group, known as RedJuliett exploited known vulnerabilities in network edge devices, such as firewalls, VPNs, and load balancers for initial access. Operating from Fuzhou, China, RedJuliett persistently targeted Taiwan, likely to support Beijing’s intelligence collection on Taiwan’s economic and diplomatic relations, as well as critical technology development. The group expanded its operations to compromise organizations in Hong Kong, Malaysia, Laos, South Korea, the United States, Djibouti, Kenya, and Rwanda. RedJuliett used SQL injection and directory traversal exploits against web and SQL applications, in addition to targeting internet-facing device vulnerabilities. The group created a SoftEther VPN bridge or client in victim networks and conducted reconnaissance and exploitation using web application security scanners, leveraging open-source web shells and exploiting an elevation of privilege vulnerability in Linux. RedJuliett’s infrastructure includes both threat actor-controlled leased servers and compromised infrastructure belonging to Taiwanese universities. The group’s activities align with Beijing’s objectives to gather intelligence on Taiwan’s economic policy, trade, and diplomatic relations, and they have also targeted multiple critical technology companies, emphasizing the strategic importance of this sector for Chinese state-sponsored threat actors.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques/ Sub Techniques |
Resource Development | T1583.003 | Acquire Infrastructure: Virtual Private Server |
Resource Development | T1584 | Compromise Infrastructure |
Reconnaissance | T1595.002 | Active Scanning: Vulnerability Scanning |
Initial Access | T1190 | Exploit Public-Facing Application |
Persistence | T1133 | External Remote Services |
Persistence | T1505.003 | Server Software Component: Web Shell |
Privilege Escalation | T1068 | Exploitation for Privilege Escalation |
APT41
APT41, also known as WICKED PANDA, is a highly sophisticated Chinese-backed cyber threat group renowned for its extensive cyber espionage and cybercrime operations. Their latest campaign involves the deployment of the KEYPLUG malware, a modular backdoor written in C++ and active since at least June 2021, with variants for both Windows and Linux platforms. KEYPLUG employs advanced techniques for command and control (C2) communication, including HTTP, TCP, KCP over UDP, and WSS. The malware exhibits high resilience and stealth, remaining undetected in environments with advanced detection solutions. The Windows variant involves a .NET loader that decrypts and executes shellcode, leading to the final payload, while the Linux variant demonstrates even greater complexity. Both variants utilize custom algorithms for API hashing and employ techniques to evade security measures, highlighting the advanced capabilities and persistent threat posed by APT41.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques/Sub-Techniques |
Initial Access | T1566 | Phishing |
Execution | T1047 | Windows Management Instrumentation |
Defense Evasion | T1070.006 | Indicator Removal: Timestomp |
T1497.001 | Virtualization/Sandbox Evasion: System Checks |
|
Credential Access | T1056.004 | Input Capture: Credential API Hooking |
Discovery | T1010 | Application Window Discovery |
Discovery | T1057 | Process Discovery |
Discovery | T1082 | System Information Discovery |
Discovery | T1497 | Virtualization/Sandbox Evasion |
Discovery | T1518.001 | Software Discovery: Security Software Discovery |
Collection | T1056.004 | Input Capture: Credential API Hooking |
Command and Control | T1071 | Application Layer Protocol |
EARTH FREYBUG
At the beginning of Q2 2024, researchers observed Earth Freybug; a subset of APT41, leveraging DLL hijacking and API unhooking to evade detection, using a newly discovered malware, UNAPIMON. This malware employs defense evasion techniques to prevent child processes from being monitored. The attack chain begins with a legitimate process, vmtoolsd.exe, being hijacked to execute a scheduled task that runs a reconnaissance batch file. This file gathers system information and sets up another task to deploy a backdoor through DLL side-loading using the SessionEnv service. UNAPIMON, a DLL malware, hooks the CreateProcessW function, creates a suspended process, and verifies DLL integrity before unhooking critical APIs in the child process. This allows malicious activities to proceed undetected. The attack highlights Earth Freybug’s evolving tactics and the effectiveness of simple yet innovative techniques in sophisticated cyber espionage campaigns.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques/Sub Techniques |
Execution | T1053 | Scheduled Task/Job |
Persistence | T1574.002 | Hijack Execution Flow: DLL Side-Loading |
Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools |
Discovery | T1082 | System Information Discovery |
ADDITIONAL OBSERVATIONS
The Chinese APT group ChamelGang has been deploying ransomware in its cyberespionage campaigns, targeting critical sectors like healthcare and government organizations. In 2022, they attacked significant institutions in India and Brazil, and in 2023, they focused on a government organization in East Asia and an aviation organization in the Indian subcontinent. ChamelGang uses CatB ransomware, obfuscated malware like BeaconLoader, and Cobalt Strike beacons for their operations. They utilize publicly available tools for privilege escalation and proxies for routing malicious traffic. Their tactics include obfuscation, exploitation of remote services, and masquerading malware components to evade detection.
NORTH KOREA APT ACTIVITIES
Targeted Country
- South Korea
- Asia
Targeted Technology
- Software
- Windows
- Linux
- Applications
Targeted Industries
- Government
- Software
- Education
- Manufacturing
- Construction
KIMSUKY
In Q2 2024, researchers identified that the North Korean cyber espionage group, Springtail (also known as Kimsuky), has been deploying a new Linux backdoor called Gomir in their recent campaign against South Korean organizations. This malware has structural similarities with GoBear and extensive code sharing between the two. Springtail has a history of targeting South Korean public sector organizations, employing sophisticated methods like spear-phishing and exploiting improperly configured DNS DMARC policies. In their latest campaign, the group used Trojanized software installation packages to distribute a new malware family named Troll Stealer, capable of stealing files, screenshots, browser data, and system information, including the GPKI folder used by South Korean government personnel. Gomir, upon execution, can install itself persistently by creating a system service or configuring a crontab based on its privilege level. It communicates with its command-and-control server using HTTP POST requests, allowing the execution of various commands such as executing shell commands, collecting system information, and exfiltrating files. This campaign underscores a heavy focus on supply chain attacks, utilizing techniques such as Trojanized software installers and fake software installers to maximize infection rates among their targeted South Korean-based organizations.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques/Sub Techniques |
Defense Evasion | T1027 | Obfuscated Files or Information |
Defense Evasion | T1027.005 | Obfuscated Files or Information: Indicator Removal from Tools |
Defense Evasion | T1497.001 | Virtualization/Sandbox Evasion: System Checks |
Discovery | T1497.001 | Virtualization/Sandbox Evasion: System Checks |
Discovery | T1518.001 | Software Discovery: Security Software Discovery |
Command and Control | T1071 | Application Layer Protocol |
Command and Control | T1095 | Non-Application Layer Protocol |
The Kimsuky APT group has recently initiated another sophisticated cyber espionage campaign leveraging Facebook as an initial entry point, posing as human rights officials to target anti-North Korea sectors. Using fake profiles, they engage targets via Facebook Messenger, gradually building trust before sharing malicious OneDrive links disguised as legitimate documents, such as ‘My_Essay(prof).msc’. This Microsoft Common Console Document file, when executed, triggers a concealed malware dubbed ReconShark. This variant exhibits advanced capabilities, including stealthy execution and connection to a command and control (C2) server. The malware’s tactics include persistent file manipulation (‘warm.vbs’) and task scheduling (‘OneDriveUpdate’), aimed at maintaining long-term access and exfiltrating sensitive information. The campaign’s global scope and use of deceptive social engineering underscore its evolving threat landscape.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Execution | T1059 | Command and Scripting Interpreter |
Persistence | T1574.002 | Hijack Execution Flow: DLL Side-Loading |
Privilege Escalation | T1574.002 | Hijack Execution Flow: DLL Side-Loading |
Defense Evasion | T1036 | Masquerading |
Defense Evasion | T1574.002 | Hijack Execution Flow: DLL Side-Loading |
Discovery | T1046 | Network Service Discovery |
Discovery | T1082 | System Information Discovery |
Command and Control | T1071 | Application Layer Protocol |
Command and Control | T1095 | Non-Application Layer Protocol |
Meanwhile, in Q2 2024, researchers discovered new activity from Kimsuky, involving the use of a malicious Google Chrome extension named “TRANSLATEXT” for cyber espionage. This extension, uploaded to an attacker-controlled GitHub repository in March, was designed to steal email addresses, usernames, passwords, and cookies, and capture browser screenshots. TRANSLATEXT bypasses the security measures of prominent email providers like Gmail, Kakao, and Naver. The attack primarily targeted South Korean academics involved in political research related to North Korea. Kimsuky’s tactics included using PowerShell scripts and manipulating the Windows registry to enforce extension installation. The group’s ongoing campaign emphasizes the need for vigilance against such advanced threats.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Execution | T1059.001 | Command and Scripting Interpreter: PowerShell |
Persistence | T1176 | Browser Extensions |
Credential Access | T1555.003 | Credentials from Password Stores: Credentials from Web Browsers |
Collection | T1113 | Screen Capture |
Command and Control | T1071.001 | Application Layer Protocol: Web Protocols |
Command and Control | T1102.001 | Web Service: Dead Drop Resolver |
Exfiltration | T1041 | Exfiltration Over C2 Channel |
In Q2 2024, researchers found that Kimsuky exploited the MS Office Equation Editor vulnerability (CVE-2017-11882) to distribute a keylogger. The keylogger was delivered via an embedded malicious script executed by mshta.exe, which connected to a URL hosting the script disguised as an error page. The script downloaded additional malware, created a file named desktop.ini.bak to store keylogging and clipboard data, and attempted to register itself in the Windows registry to run at startup. Despite a coding error preventing registry registration, the keylogger collected and sent data to the command-and-control server before deletion and recreation.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques/ Sub Techniques |
Initial Access | T1190 | Exploit Public-Facing Application |
Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Defense Evasion | T1027 | Obfuscated Files or Information |
Credential Access | T1056 | Input Capture |
Collection | T1005 | Data from Local System |
Exfiltration | T1041 | Exfiltration Over C2 Channel |
MOONSTONE SLEET
At the beginning of Q2 2024, researchers identified a new North Korean threat actor, Moonstone Sleet (also tracked as Storm-1789), which employs both established and unique attack methodologies for financial and cyberespionage objectives. This group sets up fake companies and job opportunities to engage targets, uses trojanized legitimate tools, creates a malicious game, and deploys custom ransomware. Moonstone Sleet, initially overlapping with Diamond Sleet, now operates with its own infrastructure and attack methods. Notable tactics include delivering trojanized PuTTY via social media and freelancing platforms, using malicious npm packages, and creating fake companies like StarGlow Ventures and C.C. Waterfall. The group has developed a malicious tank game, DeTankWar, and a ransomware variant, FakePenny, to target companies. Moonstone Sleet’s operations indicate a well-resourced actor with capabilities inherited from prior North Korean cyber operations, suggesting a strategic alignment with North Korean cyber objectives.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Execution | T1129 | Shared Modules |
Persistence | T1574.002 | Hijack Execution Flow: DLL Side-Loading |
Privilege Escalation | T1574.002 | Hijack Execution Flow: DLL Side-Loading |
Defense Evasion | T1027 | Obfuscated Files or Information |
Defense Evasion | T1574.002 | Hijack Execution Flow: DLL Side-Loading |
Discovery | T1082 | System Information Discovery |
Discovery | T1083 | File and Directory Discovery |
Command and Control | T1071 | Application Layer Protocol |
Impact | T1486 | Data Encrypted for Impact |
LAZARUS
By the beginning of Q2 2024, researchers discovered that the North Korea-linked Lazarus Group used fake job lures to deliver the new Kaolin RAT in attacks on individuals in Asia in the summer of 2023. The Kaolin RAT, which can change file timestamps and load DLL binaries from command-and-control (C2) servers, also serves as a conduit for the FudModule rootkit. This rootkit exploits a patched vulnerability in the appid.sys driver (CVE-2024-21338 with CVSS 7.8) to disable security mechanisms. Lazarus’s Operation Dream Job campaign uses social media and instant messaging platforms to trick targets into launching malicious ISO files containing a renamed Windows application “AmazonVNC.exe” that side-loads “version.dll” and injects a payload from “aws.cfg.” This payload downloads shellcode from a hacked Italian company website, launching RollFling and subsequently RollSling, which loads RollMid. RollMid establishes C2 communication through a three-step process involving HTML files, PNG images with steganography, and Base64-encoded data blobs, ultimately fetching the Kaolin RAT. The malware enumerates files, performs file operations, uploads to C2, alters timestamps, manages processes, executes commands, and connects to hosts. Lazarus’s complex and evolving attack chain demonstrates significant resource investment and innovation, posing a substantial challenge to cybersecurity defenses.
MITRE ATT&CK Techniques | ||
Tactics | ID | Techniques |
Initial Access | T1566 | Phishing |
Execution | T1059 | Command and Scripting Interpreter |
Persistence | T1547 | Registry Run Keys / Startup Folder |
Defense Evasion | T1027 | Obfuscated Files or Information |
Defense Evasion | T1036 | Masquerading |
Defense Evasion | T1497 | Virtualization/Sandbox Evasion |
Discovery | T1082 | System Information Discovery |
Discovery | T1083 | File and Directory Discovery |
Collection | T1005 | Data from Local System |
Command and Control | T1071 | Application Layer Protocol |
Exfiltration | T1041 | Exfiltration Over C2 Channel |
ANDARIEL
Researchers identified new Andariel APT attack campaigns targeting Korean corporations in Q2 of 2024. These attacks employed a variety of malware tools, including keyloggers, infostealers, and proxy tools alongside backdoors, aimed at gaining control and exfiltrating data from compromised systems. Notably, Nestdoor, a persistent RAT malware, featured prominently in these campaigns, leveraging tactics such as exploiting the Log4Shell vulnerability in VMware Horizon and disguising itself as legitimate software like OpenVPN to maintain persistence through task scheduling and command-and-control (C&C) server communication. Recently, Andariel has also introduced a new malware strain, Dora RAT, developed in Go, supporting basic functionalities like reverse shell and file operations, sometimes signed with valid certificates to evade detection. In addition to direct attacks, the group has been observed using proxy tools akin to those previously linked to Lazarus Group activities, underscoring their sophistication and adaptation of tactics over time.
ANDARIEL
Researchers identified new Andariel APT attack campaigns targeting Korean corporations in Q2 of 2024. These attacks employed a variety of malware tools, including keyloggers, infostealers, and proxy tools alongside backdoors, aimed at gaining control and exfiltrating data from compromised systems. Notably, Nestdoor, a persistent RAT malware, featured prominently in these campaigns, leveraging tactics such as exploiting the Log4Shell vulnerability in VMware Horizon and disguising itself as legitimate software like OpenVPN to maintain persistence through task scheduling and command-and-control (C&C) server communication. Recently, Andariel has also introduced a new malware strain, Dora RAT, developed in Go, supporting basic functionalities like reverse shell and file operations, sometimes signed with valid certificates to evade detection. In addition to direct attacks, the group has been observed using proxy tools akin to those previously linked to Lazarus Group activities, underscoring their sophistication and adaptation of tactics over time.
CONCLUSION
In Q2 2024, the APT landscape showcased intensified efforts by Iranian, Russian, Chinese, and North Korean cyber actors. These groups have demonstrated advanced capabilities and strategic intent across various regions and sectors, emphasizing the critical need for heightened cybersecurity measures. To mitigate these evolving threats, it is imperative for organizations to prioritize continuous monitoring, robust defense mechanisms, and comprehensive user education, ensuring proactive and adaptive responses to protect against the diverse and dynamic landscape of cyber espionage and cybercrime.
Source: Original Post