- Attacks Against Ukraine and Poland Continue to Use the PicassoLoader Malware - August 18, 2023
- Infrastructure and Stock for Genesis Market Were Sold on a Hacker Forum - August 18, 2023
- Schools in Franklin County Have Been Closed due to a Ransomware Attack - August 18, 2023
Chinese attackers’ most recent online spying attempts target Linux using new malware versions. Researchers have identified “Sword2033” as a backdoor and a new PingPull ransomware version as tools used by the attackers.
Unit 42 made the initial discovery of PingPull, a remote access trojan (RAT), last summer. The state-sponsored Chinese outfit Gallium, also known as Alloy Taurus, employed it in espionage operations. Governmental and financial institutions in Australia, Russia, Belgium, Malaysia, Vietnam, and the Philippines were the targets of those attacks.
The Investigation
Investigators from Unit 42 kept an eye on these espionage operations and discovered today—literally—that the Chinese hacker is once more employing PingPull in his most recent attacks, namely its new Linux edition and this time against sites in South Africa and Nepal.
Only 3 out of 62 antivirus vendors presently classify the ELF file PingPull for Linux as malicious. By comparing the HTTP communications structure, POST parameters, AES key, and directives from C2 servers, experts were able to conclude that this virus was a version of a well-known Windows infection.
The script handlers uncovered in PingPull resemble those seen in China Chopper, a web shell that is frequently used in attacks against Microsoft Exchange servers, according to Unit 42 researchers.
Researchers also uncovered a Sword2033 backdoor that was earlier undetected and made communication with the same C2 server as PingPull. It is a simpler tool with fundamental capabilities including exfiltrating files, posting files to a compromised machine, and running arbitrary instructions.
It is noteworthy that Unit 42 also discovered a second instance of Sword2033 connected to a separate C2 server. The remote server’s IP address indicates that this backdoor purposefully attempted to imitate a product of the South African military.
The Attackers Plan
In summary, Gallium attackers are expanding the market they are targeting and expanding their toolkit by utilizing the recently found Sword2023 backdoor as well as newer versions of PingPull for Linux.
Instead of depending exclusively on static detection techniques, organizations must create a complete security plan to successfully tackle this sophisticated threat.