APT

UNC215, an alleged China-linked APT group targets Israel orgs

China-linked threat actors UNC215 targeted Israeli organizations in a long-running campaign and used false flags to trick victims into believing the attacks was from Iran.

A China-linked cyber-espionage group has targeted Israeli organizations and government institutions in a campaign that began in January 2019.

The attacks were detailed by cybersecurity firm Mandiant, the state-sponsored hackers used false flags in attempts to disguise themselves as Iran-linked threat actors.

Mandiant experts tracked the group as UNC215, its TTPs overlaps the China-linked APT27 cyberespionage group, but they have no sufficient evidence to say the the two groups are the same

“In early 2019, Mandiant began identifying and responding to intrusions in the Middle East by Chinese espionage group UNC215. These intrusions exploited the Microsoft SharePoint vulnerability CVE-2019-0604 to install web shells and FOCUSFJORD payloads at targets in the Middle East and Central Asia. There are targeting and high level technique overlaps with between UNC215 and APT27, but we do not have sufficient evidence to say that the same actor is responsible for both sets of activity.” reads the report published by Mandiant. “APT27 has not been seen since 2015, and UNC215 is targeting many of the regions that APT27 previously focused on; however, we have not seen direct connection or shared tools, so we are only able to assess this link with low confidence.”

The UNC215 group exploited typically a flaw in Microsoft SharePoint, tracked as CVE-2019-0604, to compromise vulnerable installs.

Once gained initial access to the target infrastructure, the attackers performed an extensive internal network reconnaissance and harvested credentials to conduct additional malicious activities. Experts reported that the attackers also used a non-public network scanner named WHEATSCAN along with custom malware such as FOCUSFJORD web shell and HYPERBRO to spy on internal systems and maintain persistence within the target organizations.

The group was very sophisticated and spent a significant effort to fly under the radar, such as removing malware artifacts. The attackers also use to insert in the artifacts foreign language strings as false flags.

“The use of Farsi strings, filepaths containing /Iran/, and web shells publicly associated with Iranian APT groups may have been intended to mislead analysts and suggest an attribution to Iran. Notably, in 2019 the government of Iran accused APT27 of attacking its government networks and released a detection and removal tool for HYPERBRO malware.” continues the report.

In some attacks, UNC215 also used an Iranian hacking tool that was leaked on Telegram in 2019.

The interest of Chinese groups in the Israeli ecosystem is not surprising, Chinese companies have invested billions of dollars into Israeli technology startups.

Chinese organizations are also working on important construction projects in Israel such as the railway between Eilat and Ashdod, a private port at Ashdod, and the port of Haifa.

“The activity detailed in this post demonstrates China’s consistent strategic interest in the Middle East. This cyber espionage activity is happening against the backdrop of China’s multi-billion-dollar investments related to the Belt and Road Initiative (BRI) and its interest in Israeli’s robust technology sector.” concludes the report. “China has conducted numerous intrusion campaigns along the BRI route to monitor potential obstructions—political, economic, and security—and we anticipate that UNC215 will continue targeting governments and organizations involved in these critical infrastructure projects in Israel and the broader Middle East in the near- and mid-term.”

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, UNC215)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Operation Phobos Aetor: Police dismantled 8Base ransomware gang

Authorities dismantled the 8Base ransomware gang, shutting down its dark web data leak and negotiation…

4 hours ago

Apple fixes iPhone and iPad bug exploited in ‘extremely sophisticated attacks’

Apple released iOS and iPadOS updates to address a zero-day likely exploited in extremely sophisticated…

14 hours ago

HPE is notifying individuals affected by a December 2023 attack

Hewlett Packard Enterprise (HPE) has begun notifying individuals affected by a December 2023 attack carried…

15 hours ago

XE Group shifts from credit card skimming to exploiting zero-days<gwmw style="display:none;"></gwmw>

The cybercrime group XE Group exploited a VeraCore zero-day to deploy reverse shells, web shells…

23 hours ago

UK Gov demands backdoor to access Apple iCloud backups worldwide<gwmw style="display:none;"></gwmw>

UK secretly demands Apple create an iCloud backdoor via a Technical Capability Notice, raising privacy…

1 day ago

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 32

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

2 days ago

This website uses cookies.