HomeCII/OTCeranaKeeper heads straight for Thailand

CeranaKeeper heads straight for Thailand

Published on

spot_img

In a series of ongoing cyber-attacks targeting governmental institutions in Thailand since 2023, ESET researchers have identified a new threat actor known as CeranaKeeper. This group has been using revamped versions of components previously associated with the China-aligned advanced persistent threat (APT) group Mustang Panda. Additionally, CeranaKeeper has developed a new set of tools that exploit popular cloud and file-sharing services like Pastebin, Dropbox, OneDrive, and GitHub to execute commands on compromised computers and steal sensitive documents.

The distinctiveness of CeranaKeeper lies in its continuous evolution of backdoors to avoid detection and its diversified methods to aid massive data exfiltration from compromised networks. Utilizing various tools and techniques, CeranaKeeper has been actively targeting governmental entities not only in Thailand but also in other Asian countries such as Myanmar, the Philippines, Japan, and Taiwan, signifying alignment with China’s interests.

The group’s relentless pursuit of valuable data is evident through its deployment of a wide range of tools designed to extract as much information as possible from compromised networks. One of the innovative techniques observed in the group’s operations is the use of GitHub’s pull request and issue comment features to create a stealthy reverse shell, effectively turning GitHub into a command and control (C&C) server.

CeranaKeeper’s toolset includes components such as TONEINS, TONESHELL, PUBLOAD, WavyExfiller, DropboxFlop, OneDoor, and BingoShell. These tools are utilized for various purposes such as data exfiltration, remote command execution, and file uploading and downloading. WavyExfiller, for example, leverages Dropbox and PixelDrain for uploading encrypted archives of collected documents, while DropboxFlop and OneDoor abuse Dropbox and OneDrive, respectively, for executing commands and exfiltrating files.

Moreover, CeranaKeeper’s use of GitHub as a C&C server through BingoShell demonstrates the group’s sophistication in leveraging legitimate platforms for malicious activities. By creating private repositories, branches, and pull requests on GitHub, the threat actor can remotely control compromised machines, demonstrating a new covert technique that adds a layer of complexity to their operations.

The attribution of these activities to CeranaKeeper instead of Mustang Panda was based on a thorough analysis of the group’s toolset, infrastructure, and operational practices. Despite similarities in tactics, the distinct differences in organizational structure and technical aspects led researchers to classify CeranaKeeper as a separate threat actor.

In conclusion, CeranaKeeper’s relentless pursuit of sensitive data through advanced tools and techniques highlights the evolving landscape of cyber threats targeting governmental institutions. As the group continues to adapt and innovate, it poses a significant challenge to defenders in detecting and mitigating these sophisticated attacks. Further research and analysis are ongoing to uncover more insights into CeranaKeeper’s operations and future campaigns.

For more details on CeranaKeeper’s tools and techniques, the full ESET Research white paper can be accessed here.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...