Security

Research

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign


Chinese web champ Tencent's cloud is being used by unknown attackers as part of a phishing campaign that aims to achieve persistent network access at Chinese entities.

US-based threat detection, investigation and response tools vendor Securonix last week claimed to have "uncovered a covert campaign targeting Chinese-speaking users with Cobalt Strike payloads likely delivered through phishing emails. The attackers managed to move laterally, establish persistence and remain undetected within the systems for more than two weeks."

Securonix threat researchers Den Iuzvyk and Tim Peck wrote that they could not determine the origin of the attack, nor the attack vector. But the pair were able to conclude that it starts with phishing mails that carry compressed Zip files titled "20240739人员名单信息.zip" – which translates to "Personnel list information."

Clicking on that file unpacks an archive that includes a file link titled "违规远程控制软件人员名单.docx.lnk" – "List of people who violated the remote control software regulations"."

Iuzvyk and Peck suggested that the filenames mean the campaign likely targets "specific Chinese related business or government sectors … as they would both employ individuals who follow 'remote control software regulations'."

Whatever the motive, clicking on that link leads to execution of code that runs from within nested directories with names that reference "MACOS."

Several directories down lurk pair of files named dui70.dll and UI.exe.

The latter is a re-named version of a legit Windows executable named LicensingUI.exe – the tool that informs users about software licensing and activation.

"The legitimate file is designed to import several legitimate DLL files, one of which is dui70.dll and should normally reside in C:\Windows\System32. However, thanks to a DLL path traversal vulnerability, any DLL containing the same name can be sideloaded upon the execution of the renamed UI.exe by the LNK file," Securonix's researchers wrote.

The pair could not find reports of a DLL sideloading or hijacking technique involving LicensingUI.exe, so perhaps this is a new tactic.

Once the UI.exe runs, a malicious DLL that is actually an implant for the notorious Cobalt Strike attack toolkit gets to work and injects itself into the Windows binary "runonce.exe." That executable gives the attackers total control over a host.

Whoever runs this campaign then deploys several other pieces of nastyware, namely:

The above were executed in sequence and produced plenty of info the attackers exfiltrated – presumably to inform other attacks.

Securonix observed the attackers establishing persistent access in victim networks, and moving laterally using remote desktop protocol.

Lifting information on Active Directory configuration is one target, public IP addresses is another.

Securonix's researchers wrote that all the IP addresses they observed as having been used in this attack were hosted at Tencent – including in its cloud object storage service. It's not unusual for public clouds to find they have nasty customers, but China's government does not look kindly upon its tech giants when they fail to safeguard the local internet.

The security vendor has named the campaign it spotted SLOW#TEMPEST because whoever runs it is willing to lurk for a week or two in pursuit of their goals.

Threat researchers Iuzvyk and Peck labelled the attacker "highly organized and sophisticated [and] likely orchestrated by a seasoned threat actor who had experience using advanced exploitation frameworks such as CobaltStrike and a wide range of other post-exploitation tools."

"The campaign's complexity is evident in its methodical approach to initial compromise, persistence, privilege escalation and lateral movement across the network."

But Securonix could not find solid evidence linking this attack to any known APT groups.

Most such groups are thought to be affiliated either with China itself, or Russia, or North Korea.

The latter two nations are among Beijng's closest friends. But of course those who count China as a foe could also be very interested in the kind of info this attack targets. ®

Send us news
3 Comments

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting

How Chinese insiders are stealing data scooped up by President Xi's national surveillance system

'It's a double-edged sword,' security researchers tell The Reg

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

US reportedly mulls TP-Link router ban over national security risk

It could end up like Huawei -Trump's gonna get ya, get ya, get ya

US names Chinese national it alleges was behind 2020 attack on Sophos firewalls

Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

China's Salt Typhoon recorded top American officials' calls, says White House

No word yet on who was snooped on. Any bets?

Blocking Chinese spies from intercepting calls? There ought to be a law

Sen. Wyden blasts FCC's 'failure' amid Salt Typhoon hacks

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks

IOCONTROL targets IoT and OT devices from a ton of makers, apparently