Chinese APT ‘Emperor Dragonfly’ Moonlights With Ransomware

Chinese APT ‘Emperor Dragonfly’ Moonlights With Ransomware
Summary: The recent RA World ransomware attack has revealed unexpected usage of espionage-associated tools by attackers, believed to be linked to a China-based actor. The attack, which targeted an unnamed Asian software and services firm, involved exploiting vulnerabilities to deploy a ransomware payload after stealing sensitive credentials. Symantec’s findings connect this incident to a series of prior espionage attacks using similar toolsets, suggesting a shift in tactics among cyber threat actors.

Affected: Undisclosed Asian software and services company

Keypoints :

  • RA World ransomware leveraged a legitimate Toshiba executable to deploy malware.
  • Attackers exploited a vulnerability (CVE-2024-0012) in Palo Alto PAN-OS to gain access.
  • Prior attacks using the same toolset targeted government entities and telecoms in Southeast Asia.
  • Attackers obtained Amazon S3 cloud credentials to steal data before encrypting company systems.
  • Potential link to the Emperor Dragonfly group, known for espionage and ransomware tactics.

Source: https://www.darkreading.com/cyberattacks-data-breaches/chinese-apt-emperor-dragonfly-ransomware-attack