{"id":18926,"date":"2022-05-03T08:10:03","date_gmt":"2022-05-03T16:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/05\/03\/news-12659\/"},"modified":"2022-05-03T08:10:03","modified_gmt":"2022-05-03T16:10:03","slug":"news-12659","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/03\/news-12659\/","title":{"rendered":"State-backed hacking group from China is targeting the Russian military"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Tue, 03 May 2022 15:31:20 +0000<\/strong><\/p>\n<p>In an unexpected turn of events, research has surfaced about a Chinese APT (advanced persistent threat) group targeting the Russian military in recent cyberattacks.<\/p>\n<p>Tracked as Bronze President, Mustang Panda, RedDelta, and TA416, the group has focused mainly on Southeast Asian targets\u2014and more recently, <u><a href=\"https:\/\/www.securityweek.com\/chinese-threat-actor-mustang-panda-updates-tools-attacks-vatican\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">European diplomats<\/a><\/u>\u2014and turned their attention towards Russia and started targeting the country\u2019s military situated close to the Chinese border.<\/p>\n<p>Dell SecureWorks retrieved a file named <em>Blagoveshchensk &#8211; Blagoveshchensk Border Detachment<\/em>, which bears the icon of a PDF file but is actually an executable file.<\/p>\n<p>From the <a href=\"https:\/\/www.secureworks.com\/blog\/bronze-president-targets-russian-speakers-with-updated-plugx\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">report<\/a>:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;Blagoveshchensk is a Russian city close to the China border and is home to the 56th Blagoveshchenskiy Red Banner Border Guard Detachment. This connection suggests that the filename was chosen to target officials or military personnel familiar with the region.&#8221;<\/p>\n<\/blockquote>\n<p>Once the supposed document is &#8220;opened,&#8221; the executable downloads four files, including a clean document file used as a decoy (screenshot below), from a server Mustang Panda is known to use.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"56205\" data-permalink=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/05\/state-backed-hacking-group-from-china-is-targeting-the-russian-military\/attachment\/secureworks-decoy-doc\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/secureworks-decoy-doc.png\" data-orig-size=\"576,514\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"secureworks-decoy-doc\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/secureworks-decoy-doc-300x268.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/secureworks-decoy-doc.png\" width=\"576\" height=\"514\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/secureworks-decoy-doc.png\" alt=\"\" class=\"wp-image-56205\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/secureworks-decoy-doc.png 576w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/04\/secureworks-decoy-doc-300x268.png 300w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\" \/><figcaption><em>Although the file name is aimed at Russian recipients, it throws one off when they see the decoy document written in English. (Source: Dell SecureWorks)<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The document appears like a formal report from the European Commission, and it details the refugee and migrant status pressuring countries bordering Belarus.<\/p>\n<p>The three additional files are required for Mustang Panda to use <u><a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/001\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DLL search order hijacking<\/a><\/u>\u00a0to install a variant of <u><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.plugx\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">PlugX<\/a><\/u>, an old remote access tool (RAT), onto target systems. This allows threat actors to secretly load a malicious DLL, thus avoiding detection from security solutions software.<\/p>\n<p>PlugX is capable of stealing sensitive information from target machines. Although this, as a whole, is a benign attack that involves intelligence gathering, it is interesting to note the shifting targets, presumably based on the political situation in Europe and what\u2019s happening in Ukraine. Suffice to say, China continues to look out for itself and its interests, even if it involves countries it considers <u><a href=\"https:\/\/www.newsweek.com\/beijing-says-china-russia-are-not-allies-1683131\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">&#8220;strategic partners of coordination&#8221;<\/a><\/u>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/05\/state-backed-hacking-group-from-china-is-targeting-the-russian-military\/\">State-backed hacking group from China is targeting the Russian military<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/05\/state-backed-hacking-group-from-china-is-targeting-the-russian-military\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Tue, 03 May 2022 15:31:20 +0000<\/strong><\/p>\n<p>Chinese state-sponsored actors have been caught red-handed trying to extract intelligence from Russians via a guard camp close to their border.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/05\/state-backed-hacking-group-from-china-is-targeting-the-russian-military\/\">State-backed hacking group from China is targeting the Russian military<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[25950,25951,402,22818,3919,25952,20692,25953,251,10510,25954],"class_list":["post-18926","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-blagoveshchensk","tag-bronze-president","tag-china","tag-dell-secureworks","tag-hacking","tag-mustang-panda","tag-plugx","tag-reddelta","tag-russia","tag-social-engineering","tag-ta416"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18926"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18926\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18926"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}