Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » China-linked hackers deploy new “UNAPIMON” malware for covert operations
    Cyber Security

    China-linked hackers deploy new “UNAPIMON” malware for covert operations

    techempireBy techempire2 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportApril 2, 2024Editorial DepartmentCyber ​​espionage/threat intelligence

    Chinese malware

    Threat activity clusters tracked as Earth Freyworm A new piece of malware called UNAPIMON has been observed flying under the radar.

    “Earth Freybug is a cyber threat group that has been active since at least 2012 and focuses on espionage and financially motivated activities,” Trend Micro security researcher Christopher So said in a report released today.

    “It has been observed that it targets organizations from different sectors in different countries.”

    The cybersecurity firm describes Earth Freybug as a subset of APT41, a China-linked cyber espionage group also tracked as Axiom, Brass Typhoon (formerly Barium), Bronze Atlas, HOODOO, Wicked Panda and Winnti.

    Internet security

    The adversary group is known to rely on a combination of standalone binaries (LOLBins) and custom malware to achieve its goals. Techniques such as dynamic link library (DLL) hijacking and application programming interface (API) dehooking are also used.

    Trend Micro said the campaign overlaps in tactics with a cluster previously disclosed by cybersecurity firm Cybereason called “Operation CuckooBees,” which refers to technology and manufacturing companies in East Asia, Western Europe, and North America. of intellectual property theft.

    The starting point of the attack chain is to use a legitimate executable file associated with VMware Tools (“vmtoolsd.exe”), use “schtasks.exe” to create a scheduled task, and deploy a file named “cc.bat” on the remote computer.

    It is unclear how the malicious code was injected into vmtoolsd.exe, although it is suspected that it may involve the exploitation of external-facing servers.

    Chinese malware

    This batch script is designed to collect system information and launch a second scheduled task on the infected host, which in turn executes another batch file with the same name (“cc.bat”) to ultimately execute the UNAPIMON malware.

    “The second cc.bat is noteworthy in that it uses a service that loads a non-existent library to sideload a malicious DLL,” So explained. “In this case, the service is SessionEnv.”

    This paves the way for the execution of TSMSISrv.DLL, which is responsible for deleting another DLL archive (namely UNAPIMON) and injecting the same DLL into cmd.exe. At the same time, the DLL file is also injected into SessionEnv for defense evasion.

    On top of that, the Windows command interpreter is designed to execute commands from another computer, essentially turning it into a backdoor.

    Internet security

    UNAPIMON is a simple C++-based malware that utilizes an open source Microsoft library called Detours to unhook key API functions, thereby preventing child processes from being monitored, thereby evading sandbox environments that implement API monitoring through hooks. detection.

    The cybersecurity firm characterized the malware as original, praising the authors’ “coding skills and creativity” and their use of off-the-shelf libraries to perform malicious operations.

    “Earth Freybug has been around for quite some time, and their methods have evolved over time,” Trend Micro said.

    “This attack also shows that even simple techniques can be used effectively if applied correctly. Applying these techniques to existing attack patterns can make attacks more difficult to detect.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.