Chinese hacking groups target Russian government, IT firms

Share:

A series of targeted cyberattacks that started at the end of July 2024, targeting dozens of systems used in Russian government organizations and IT companies, are linked to Chinese hackers of the APT31 and APT 27 groups.

Kaspersky, who discovered the activity, dubbed the campaign “EastWind,” reporting that it employs an updated version of the CloudSorcerer backdoor spotted in a similar cyberespionage campaign from May 2024, also targeting Russian government entities.

It should be noted that the CloudSorcerer activity isn’t bound to Russia, as Proofpoint recorded an attack targeting a U.S.-based think tank in May 2024.

EastWind toolkit

The initial infection relies on phishing emails carrying RAR archive attachments named after the target, which employ DLL side loading to drop a backdoor on the system from Dropbox while opening a document for deception.

The backdoor can navigate the filesystem, execute commands, exfiltrate data, or introduce additional payloads on the compromised machine.

Kaspersky’s observations reveal that the attackers used the backdoor to introduce a trojan named ‘GrewApacha,’ which has been associated with APT31.

The most recent variant of GrewApacha features some improvements compared to the last analyzed version from 2023, including using two command servers instead of one, storing their address in a base64-encoded string on GitHub profiles from where the malware reads it.

Another malware loaded by the backdoor is a refreshed version of CloudSorcerer packed with VMProtect for evasion.

CloudSorcerer uses an encryption protection mechanism designed to prevent its execution on non-targeted systems by employing a unique key generation process tied to the victim’s machine.

Upon execution, a utility (GetKey.exe) generates a unique four-byte number from the system’s current state and encrypts it using the Windows CryptProtectData function to derive a unique, system-bound ciphertext.

If execution of the malware is attempted on any other machine, the generated key will differ, so the CloudSorcerer payload decryption will fail.

The new version of CloudSorcerer also uses public profile pages to get its initial C2 address but has now switched from GitHub to using Quora and the Russian social media network LiveJournal for this purpose.

The third implant seen in the EastWind attacks, introduced through CloudSorcered, is PlugY, a previously unknown backdoor.

PlugY features high versatility in its C2 communications and the ability to execute commands for file operations, shell command execution, screen capturing, key-logging, and clipboard monitoring.

Kaspersky’s analysis indicates that the code used in PlugY has been previously seen in attacks by the APT27 threat group.

Also, a library used for C2 communications through the UDP protocol is found only in DRBControl and PlugX, which are malware tools extensively used by Chinese threat actors.

Kaspersky comments that, as the backdoors used in the EastWind attacks are notably different, detecting them all on a compromised machine is challenging. Some things to look out for are:

  • DLL files larger than 5MB in size in the ‘C:\Users\Public’ directory
  • Unsigned ‘msedgeupdate.dll’ files in the file system
  • A running process named ‘msiexec.exe’ for each logged-in user

The Russian cybersecurity firm concludes that APT27 and APT31 are likely working together in EastWind.

This case highlights the complex interplay between allied countries with strong diplomatic ties and common strategic goals yet active cyberespionage operations against each other.

Collaboration in economic, security, and military fields does not exclude intelligence agencies operating in the shadows from launching sophisticated and narrow-targeted espionage operations to collect valuable intelligence.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:23 pm, Jan 22, 2025
weather icon 3°C
L: 2° | H: 4°
overcast clouds
Humidity: 88 %
Pressure: 1003 mb
Wind: 3 mph NNW
Wind Gust: 10 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 7:52 am
Sunset: 4:31 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 9:00 pm
weather icon
2° | 4°°C 1 mm 100% 18 mph 90 % 1005 mb 0 mm/h
Fri Jan 24 9:00 pm
weather icon
5° | 11°°C 1 mm 100% 25 mph 89 % 1004 mb 0 mm/h
Sat Jan 25 9:00 pm
weather icon
2° | 5°°C 1 mm 100% 6 mph 96 % 1013 mb 0 mm/h
Sun Jan 26 9:00 pm
weather icon
1° | 7°°C 0 mm 0% 16 mph 95 % 1013 mb 0 mm/h
Mon Jan 27 9:00 pm
weather icon
4° | 9°°C 1 mm 100% 26 mph 92 % 996 mb 0 mm/h
Tomorrow 12:00 am
weather icon
4° | 4°°C 0 mm 0% 4 mph 84 % 1003 mb 0 mm/h
Tomorrow 3:00 am
weather icon
3° | 3°°C 0 mm 0% 5 mph 90 % 1004 mb 0 mm/h
Tomorrow 6:00 am
weather icon
3° | 3°°C 0 mm 0% 7 mph 87 % 1005 mb 0 mm/h
Tomorrow 9:00 am
weather icon
4° | 4°°C 0 mm 0% 9 mph 83 % 1004 mb 0 mm/h
Tomorrow 12:00 pm
weather icon
8° | 8°°C 0 mm 0% 16 mph 76 % 1000 mb 0 mm/h
Tomorrow 3:00 pm
weather icon
8° | 8°°C 1 mm 100% 18 mph 71 % 999 mb 0 mm/h
Tomorrow 6:00 pm
weather icon
6° | 6°°C 0.8 mm 80% 16 mph 72 % 1002 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
5° | 5°°C 0 mm 0% 11 mph 75 % 1004 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€99,663.54
-2.50%
Ethereum(ETH)
€3,119.99
-2.48%
XRP(XRP)
€3.04
-0.21%
Tether(USDT)
€0.96
-0.05%
Solana(SOL)
€251.81
3.36%
Dogecoin(DOGE)
€0.344231
-4.12%
USDC(USDC)
€0.96
0.00%
Shiba Inu(SHIB)
€0.000019
-3.31%
Pepe(PEPE)
€0.000014
-3.96%
Peanut the Squirrel(PNUT)
€0.346047
-3.48%
Scroll to Top