Categories: Cyber CrimeHacking

FireEye uncovered two cyber espionage campaigns operating in parallel from China

FireEye discovered two distinct groups of Chinese hackers operating cyber espionage campaigns on a large-scale in parallel.

Security experts at FireEye have discovered two hacking campaigns conducted by distinct groups operating in separate regions of China that seems to work in parallel.

The first team of hackers, named Moafee, is targeting military and government organizations which were in some way involved in South China sea dispute. The attackers targeted different organizations as explained by the researchers at FireEye in a blog post, and appears to operate from the Guangdong Province and hit entities working in the defense industry in the United States.

The second team, dubbed DragonOK, conducted corporate espionage operations on high-tech and manufacturing companies in Japan and Taiwan.

FireEye researchers will be publishing a report that details two attack campaigns by different groups in separate regions of China, apparently operating in parallel.” states the post published by FireEye. “It seems that both groups, while operating in distinctly different regions, either 1) collaborate, 2) receive the same training), 3) share a common toolkit supply chain, or 4) some combination of these scenarios, which means they are employing a ‘production line’-type approach to initiating cyber attacks to breach defenses,” the researchers blogged. “Both campaigns use similar tools, techniques and procedures (TTPs) – including custom-built backdoors and remote-administration tools (RATs) to infiltrate their targets’ networks.”

Moafee and DragonOK teams use similar tools, techniques and procedures (TTPs) for their espionage campaigns, and further element that seems to confirm they are operating in parallel is that the both groups used custom-built backdoors and remote administration tools (RATs) to compromise the targeted networks.

“The two different operators seem to share backdoors and RATs – some of which are custom; others are publicly available. Overlapping tools include:

Hackers of the two teams both use the HUC Packet Transmit Tool (HTRAN) proxy tool hide the origin of the attacks, the technique was already used by China based hackers in different campaign, including Beebus cyber espionage campaign, which targeted defense and aerospace industries to steal intellectual property and industrial secrets from US companies.

The hackers conducted spear-phishing attacks using most advanced social engineering techniques to deceive victims, the mail sent are written in victim’s native language and used password-protected documents and large file sizes to maqsuerade their attacks.

“Both Moafee and DragonOK favor spear-phishing emails as an attack vector, often employing a decoy to deceive the victim,” according to the researchers. “The emails are well crafted and audience specific, even written in the intended victim’s native language. Attachments are typically sent as an executable file embedded in a ZIP archive or a password-protected Microsoft Office document. We also observed both groups using decoy documents that are presented to the victim while the malware runs in the background.”

The experts of FireEye were able to track back the command and controls used by both groups, the Moafee group was running HTRAN proxies on multiple C&Cs operated on CHINANET and hosted in Guangdong Province the C&C servers operates by DragonOK were also operated on CHINANET but are hosted in the Jiangsu Province.

The experts also discovered a third hacking team operating with same techniques and tools, but there aren’t enough elements to link it to Moafee and DragonOK.

The experts closed the post highlighting that by sharing TTPs and coordinating joint attacks, the bad actors are leveraging China’s supply chain economic expertise to perform extensive worldwide espionage.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs –  Cyber espionage, China)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

3 mins ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

25 mins ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

5 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

17 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

24 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

1 day ago

This website uses cookies.