HomeRisk ManagementsThe Evasive Panda Targets Tibet With Trojanized Software

The Evasive Panda Targets Tibet With Trojanized Software

Published on

spot_img

A recent cyber-espionage campaign conducted by the China-aligned APT group Evasive Panda, also known as BRONZE HIGHLAND and Daggerfly, has been identified as targeting Tibetans across multiple countries and territories. Beginning in September 2023, this operation utilizes a combination of targeted watering hole tactics and supply-chain compromises involving trojanized installers of Tibetan language translation software.

ESET researchers have shed light on the strategic methods employed by the attackers, particularly during the Monlam Festival, an important religious event for Tibetan Buddhism. By compromising the website of the festival organizer, the cybercriminals executed a watering hole attack, specifically directing individuals from certain networks to download malicious software unknowingly.

Additionally, the attackers utilized the festival website and a Tibetan news website, Tibetpost – tibetpost[.]net – as hosts for payloads acquired through the malicious downloads. These payloads included two complete backdoors for Windows systems and an undisclosed number of payloads for macOS, embedded within the trojanized software installers with the aim of further infiltrating victims’ devices.

Evasive Panda’s tactics demonstrate a high level of sophistication, with the deployment of various malicious software tools, including Nightdoor – a previously undocumented backdoor for Windows. This campaign showcases the group’s expertise in deploying downloaders, droppers, and backdoors to compromise networks and target individuals in East Asia.

By exploiting vulnerabilities in web infrastructure and software supply chains, the attackers sought to breach networks and compromise specific targets efficiently. The timing of the operation coinciding with the Monlam Festival indicates a strategic decision to capitalize on the increased online activity during this period.

For a more comprehensive understanding of the campaign, including Indicators of Compromise (IoCs) and samples, interested parties can access the ESET GitHub repository. This repository provides detailed information regarding the cyber-espionage techniques employed by Evasive Panda and offers insights into mitigating the risks associated with such attacks.

As cyber threats continue to evolve, it is imperative for organizations and individuals to remain vigilant and implement robust cybersecurity measures to safeguard against potential attacks. The Evasive Panda campaign serves as a stark reminder of the persistent threat posed by sophisticated cybercriminals and the importance of proactive defense strategies in today’s digital landscape.

Source link

Latest articles

Attackers Abuse Google Ad Feature to Target Slack, Notion Users

 Attackers are once again abusing Google Ads to target people with info-stealing malware, this time...

Hackers allege to have infiltrated computer network of Israeli nuclear facility

An Iran-linked hacking group has declared that they successfully breached the computer network of...

Hacker allegedly uses white-hat approach to exploit crypto game for $4.6M

In a surprising turn of events, the food-themed crypto game Super Sushi Samurai fell...

Reducing Threats from the IABs Market

As ransomware attacks continue to escalate in frequency and severity, one of the key...

More like this

Attackers Abuse Google Ad Feature to Target Slack, Notion Users

 Attackers are once again abusing Google Ads to target people with info-stealing malware, this time...

Hackers allege to have infiltrated computer network of Israeli nuclear facility

An Iran-linked hacking group has declared that they successfully breached the computer network of...

Hacker allegedly uses white-hat approach to exploit crypto game for $4.6M

In a surprising turn of events, the food-themed crypto game Super Sushi Samurai fell...
en_USEnglish