HomeCII/OTChina-sponsored attackers focus on 40,000 corporate users in a three-month period.

China-sponsored attackers focus on 40,000 corporate users in a three-month period.

Published on

spot_img

State-sponsored actors have recently launched three novel credential-phishing campaigns that have affected approximately 40,000 corporate users, including high-level executives, within a three-month period. These campaigns have been identified by researchers from Menlo Security, who have noted the sophistication and evasiveness of the attacks.

Known as LegalQloud, Eqooqp, and Boomer, these campaigns utilize highly evasive and adaptive threat techniques that can bypass security controls such as multifactor authentication and URL filtering. The attackers enter corporate networks through browsers, enabling them to circumvent traditional security measures and cloud network services. This evolution in attack capabilities poses a significant challenge to security practitioners, who are urged to enhance their controls to address these sophisticated threats promptly.

The primary focus of these campaigns is credential phishing, with evidence linking them to Chinese-sponsored threat actors. These actors have been targeting the US and private enterprises in aggressive cyber espionage efforts, posing a threat to national security and intellectual property. While attribution to a specific group has been established, the exact nation behind these attacks remains unclear.

These campaigns have targeted over 3,000 unique domains spanning various industries and government institutions. The attackers employ tactics such as bypassing multifactor authentication, using phishing kits, and implementing adversary-in-the-middle tactics to gain control over user sessions. Additionally, they impersonate entities like Microsoft to lure victims and utilize dynamic phishing links that are challenging to detect using traditional filtering technologies.

Each of the campaigns — LegalQloud, Eqooqp, and Boomer — has its own distinct targets and tactics aimed at extracting credentials from corporate users for malicious purposes, primarily cyber espionage. LegalQloud impersonates legal firms to steal Microsoft credentials, Eqooqp targets government and private sector organizations with AitM attacks, and Boomer employs advanced evasive techniques to target government and healthcare sectors.

The growing sophistication of these attacks highlights the need for organizations to constantly refine their cybersecurity strategies to keep pace with evolving threats. AitM attacks, in particular, are considered the future of cybercrime, posing challenges for traditional security measures. As threat actors continue to adapt and innovate, organizations must prioritize security awareness and phishing training to educate users about these sophisticated attack techniques.

Experts emphasize the importance of adopting a zero-trust framework that evolves alongside technological advancements and shifts in the threat landscape. This approach, which emphasizes continuous refinement and adaptation, is crucial for mitigating risks and safeguarding sensitive information against increasingly sophisticated attacks. By prioritizing cybersecurity and implementing robust defense mechanisms, organizations can better protect themselves against state-sponsored cyber threats.

Source link

Latest articles

Nation-State Hackers Set the Mood

Who Knew APT Hackers Liked Emojis So Much? In a surprising twist within the realm...

AI-Driven Insider Risk Labeled a Critical Business Threat, Warns Report

Rising Insider Threats: A Growing Concern for Businesses The landscape of cybersecurity is evolving, and...

Strategies for Software Development that Empower Enterprises to Address Real-World Risks

Leveraging Secure-by-Design Processes for Effective Governance and Human Error Management In an increasingly complex digital...

New MongoDB Vulnerability Lets Attackers Crash Servers and Expose Critical Data

Cato CTRL's senior security researcher, Vitaly Simonovich, has brought to light a significant denial-of-service...

More like this

Nation-State Hackers Set the Mood

Who Knew APT Hackers Liked Emojis So Much? In a surprising twist within the realm...

AI-Driven Insider Risk Labeled a Critical Business Threat, Warns Report

Rising Insider Threats: A Growing Concern for Businesses The landscape of cybersecurity is evolving, and...

Strategies for Software Development that Empower Enterprises to Address Real-World Risks

Leveraging Secure-by-Design Processes for Effective Governance and Human Error Management In an increasingly complex digital...