Researchers were caught off guard by a recent RA World ransomware attack that utilized a tool set previously associated with China-based espionage actors. The attack, which took place in late 2024 according to Symantec, involved a legitimate Toshiba executable named toshdpdb.exe that was used to deploy a malicious dynamic link library (DLL) containing a PlugX backdoor on the victim’s device.
In this particular instance, the threat actors leveraged this tool kit to deploy RA World ransomware within an unidentified Asian software and services company, demanding a hefty ransom of $2 million. The initial infection vector remains unknown, although the attacker claimed to have exploited a Palo Alto PAN-OS vulnerability (CVE-2024-0012), as reported by Symantec.
The attackers allegedly gained access to administrative credentials through the company’s intranet, followed by stealing Amazon S3 cloud credentials from its Veeam server. These stolen credentials were then used to access and encrypt data stored in the company’s S3 buckets. Researchers speculated that based on the tactics, techniques, and procedures used in the attack, the perpetrator could be affiliated with the China-linked Emperor Dragonfly (also known as Bronze Starlight) group, which has a history of deploying ransomware to mask intellectual property theft.
Symantec researchers highlighted previous intrusions involving the same tool set that targeted the foreign ministry of a Southeastern European country, the government of another country, two Southeast Asian government ministries, and a Southeast Asian telecoms operator. These attacks, occurring between July and January, were focused on espionage and did not involve any ransomware activity.
According to the researchers, while tools associated with China-based espionage groups are typically shared resources, many of them are not publicly available and are not commonly associated with cybercrime activities. This divergence from the norm has raised concerns among cybersecurity experts who are closely monitoring the evolving tactics of threat actors in the digital landscape.
The use of sophisticated tool sets previously linked to state-sponsored espionage activities for ransomware attacks signals a concerning shift in the cyber threat landscape. As threat actors continue to adapt and evolve their tactics, organizations must remain vigilant and proactive in their cybersecurity measures to defend against such advanced and multifaceted attacks.
The prevalence of ransomware attacks targeting critical infrastructure, government entities, and businesses underscores the urgent need for improved cybersecurity defenses and international cooperation to combat cyber threats effectively. Collaboration between public and private sectors, as well as information-sharing among cybersecurity experts, is crucial in addressing the growing challenges posed by cybercriminals leveraging advanced tools and techniques for malicious purposes.

