Cyber Crime

GALLIUM Threat Group targets global telcos, Microsoft warns

The Microsoft Threat Intelligence Center (MSTIC) warns of GALLIUM threat group targeting global telecommunication providers worldwide.

The Microsoft Threat Intelligence Center (MSTIC) warns of GALLIUM threat group targeting global telecommunication providers worldwide.

Microsoft experts reported that the GALLIUM hacking group exploits unpatched vulnerabilities to compromise systems running /JBoss application servers.

“Microsoft Threat Intelligence Center (MSTIC) is raising awareness of the ongoing activity by a group we call GALLIUM, targeting telecommunication providers.” reads the warning published by Microsoft. “To compromise targeted networks, GALLIUM target unpatched internet-facing services using publicly available exploits and have been known to target vulnerabilities in WildFly/JBoss.”

The GALLIUM threat actor is active, but its activity was more intense between 2018 and mid-2019.

Once the attackers have compromised the target network, they used common techniques and tools like Mimikatz to steal credentials that could be used for lateral movement.

Below the list of tools that were used by the GALLIUM threat actor:

ToolPurpose
HTRANConnection bouncer to proxy connections.
MimikatzCredential dumper.
NBTScanScanner for open NETBIOS nameservers on a local or remote TCP/IP network.
NetcatReads from and writes to network connections using TCP or UDP protocols.
PsExecExecutes a command line process on a remote machine.
Windows Credential Editor (WCE)Credential dumper.
WinRARArchiving utility.

GALLIUM attackers have signed several tools using stolen code signing certificates.

Experts pointed out that GALLIUM threat actors were using common versions of malware and publicly available tools with a few changes to evade detection. The operators leverage on low cost and easy to replace infrastructure using dynamic-DNS domains and regularly reused hop points.

“MSTIC analysis indicates the use of dynamic DNS providers as opposed to registered domains is in line with GALLIUM’s trend towards low cost and low effort operations.” continues the analysis.

“GALLIUM domains have been observed hosted on infrastructure in mainland China, Hong Kong SAR, and Taiwan.”

The threat actor relies heavily on web shells as a first stage of the attack chain to gain persistence in the target network, then it delivers malware through the existing web shell access.

GALLIUM relies on web shells to gain persistence within a target’s network and to drop their second stage malware payloads instead of first stage installers Microsoft adds.

In addition to standard China Chopper, the group is also using a native web shell for servers running Microsoft IIS dubbed BlackMould.

BlackMould is able to enumerate local drives, employ basic file operations (i.e. find, read, write, delete, and copy), set file attributes, infiltrate files, and run cmd.exe with parameters.

The group delivers customized versions of Gh0st RAT and Poison Ivy, in both cases, the attackers have modified the communication method used by both malware.

Attackers also used QuarkBandit as a second-stage malware, experts described it as a Gh0st RAT variant with modified configuration options and encryption.

The researchers also observed the GALLIUM threat actors employing SoftEther VPN software to access the target network and maintain persistence.

Microsoft also published a list of indicators of compromise (IOCs) in its report.

The same attack group was previously reported earlier this year by researchers at Cybereason who tracked the campaign as “Operation Softcell“.  The analysis published by Cybereason details the nature of the attacks that were discovered by Cybereason in 2018, including the hacking of the telco companies to carry out state-sponsored espionage.  Cybereason found evidence that the attacks date back to 2012.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – GALLIUM, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

16 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

This website uses cookies.