HomeCII/OTChina's 'Earth Lusca' Spreads Multiplatform Backdoor

China’s ‘Earth Lusca’ Spreads Multiplatform Backdoor

Published on

spot_img

A recently discovered multiplatform backdoor known as KTLVdoor has raised concerns among cybersecurity experts, pointing towards a potentially forceful espionage campaign orchestrated by a Chinese threat actor. This backdoor, capable of impersonating system utilities or tools, enables attackers to gain full control over an organization’s digital environment.

According to researchers at Trend Micro, the Chinese actor Earth Lusca was identified as the entity behind the utilization of this backdoor in an attack on a China-based trading company. The malware, written in Golang and available in both Microsoft Windows and Linux versions, is typically distributed as a dynamic link library (DLL). The researchers also uncovered a vast back-end infrastructure associated with KTLVdoor, hinting at the possibility of imminent attacks by multiple actors.

While the researchers have so far observed this backdoor being used in a single attack, the presence of over 50 command-and-control servers hosted by Chinese ISP Alibaba, communicating with different variants of the malware, suggests the likelihood of future attack campaigns leveraging KTLVdoor. Despite some malware samples being linked to Earth Lusca with high certainty, the researchers emphasized that the entire infrastructure may not be exclusive to this particular threat actor, hinting at potential collaboration with other Chinese-speaking threat actors.

The consistent use of IP addresses from Alibaba across the infrastructure implies that the malware could be in an early stage of testing and customization by multiple actors. However, there remain several unknown details about the campaign, leaving room for further analysis and investigation.

Key Aspects of the Malware

Comparatively more intricate than the usual tools associated with Earth Lusca, KTLVdoor has garnered attention for its sophisticated design and deployment. Trend Micro’s research indicates that Earth Lusca, also known as RedHotel or TAG-22, typically targets government organizations across Asia, Latin America, and other regions, with suspected affiliations to the Winnti collective of Chinese threat actors. While primarily focused on cyber espionage, Earth Lusca has reportedly targeted financial entities like cryptocurrency and gambling firms for monetary gains on occasion.

Notably, KTLVdoor samples work diligently to evade detection and analysis, leveraging encryption and obfuscation techniques to complicate reverse engineering efforts. The malware’s ability to disguise itself as legitimate system utilities like sshd, java, and sqlite enables attackers to execute various malicious operations, including command execution, file manipulation, data exfiltration, and network reconnaissance.

The researchers identified elaborate communication mechanisms between KTLVdoor and its C2 servers, involving encrypted and compressed message exchanges. Depending on configuration settings, message delivery can occur in simplex or duplex mode, allowing bidirectional communication between infected devices and the attackers’ command infrastructure.

Detecting and Defending Against the Threat

Given the malware’s sophisticated evasion tactics, organizations potentially targeted by Earth Lusca or other Chinese APTs are advised to remain vigilant for signs of compromise by similar undisclosed threats. Trend Micro shared a detailed list of indicators of compromise (IOCs) for Earth Lusca and KTLVdoor, including related IP addresses, hashes, and a DLL decryptor for further analysis.

To enhance defense capabilities against advanced persistent threats (APTs) like Earth Lusca, organizations can implement security platforms with multilayered defenses and proactive detection mechanisms. This proactive approach aims to identify and block malicious tools and services before they can infiltrate the organization’s network, reducing the likelihood of successful cyberattacks.

In conclusion, the emergence of KTLVdoor highlights the evolving tactics employed by threat actors in conducting espionage campaigns, underscoring the importance of robust cybersecurity measures to safeguard digital assets and sensitive information from malicious intrusions.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...