China’s APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe

Teilen:

A nation-state actor with links to China is suspected of being behind a series of attacks against industrial organizations in Eastern Europe that took place last year to siphon data stored on air-gapped systems.

Cybersecurity company Kaspersky attributed the intrusions with medium to high confidence to a hacking crew called APT31, which is also tracked under the monikers Bronze Vinewood, Judgement Panda, and Violet Typhoon (formerly Zirconium), citing commonalities in the tactics observed.

The attacks entailed the use of more than 15 distinct implants and their variants, broken down into three broad categories based on their ability to establish persistent remote access, gather sensitive information, and transmit the collected data to actor-controlled infrastructure.

One of the implant types appeared to be a sophisticated modular malware, aimed at profiling removable drives and contaminating them with a worm to exfiltrate data from isolated, or air-gapped, networks of industrial organizations in Eastern Europe, Kaspersky said.

The other type of implant is designed for stealing data from a local computer and sending it to Dropbox with the help of the next-stage implants.

One set of backdoors includes various versions of a malware family called FourteenHi that have been put to use since at least mid-March 2021 and which come with a broad spectrum of features to upload and download arbitrary files, run commands, start a reverse shell, and erase their own presence from the compromised hosts.

A second first-stage backdoor used for remote access and initial data gathering is MeatBall, which possesses capabilities to list running processes, enumerate connected devices, perform file operations, capture screenshots, and self-update itself.

Also discovered is a third type of first-stage implant that makes use of Yandex Cloud for command-and-control, mirroring similar findings from Positive Technologies in August 2022 detailing APT31 attacks targeting Russian media and energy companies.

The tendency to abuse cloud services (e.g., Dropbox, Yandex, Google, etc.) is not new, but it continues to expand, because it is hard to restrict / mitigate in cases when an organization’s business processes depend on using such services, Kaspersky researchers said.

Threat actors keep making it more difficult to detect and analyze threats by hiding payloads in encrypted form in separate binary data files and by hiding malicious code in the memory of legitimate applications via DLL hijacking and a chain of memory injections.

APT31 has also been observed utilizing dedicated implants for gathering local files as well as exfiltrating data from air-gapped systems by infecting removable drives.

The latter malware strain consists of at least three modules, with each component responsible for different tasks, such as profiling and handling removable drives, recording keystrokes and screenshots, and planting second-step malware on newly connected drives.

The threat actor’s deliberate efforts to obfuscate their actions through encrypted payloads, memory injections, and DLL hijacking [underscore] the sophistication of their tactics, Kirill Kruglov, senior security researcher at Kaspersky ICS CERT, said.

Although exfiltrating data from air-gapped networks is a recurrent strategy adopted by many APTs and targeted cyberespionage campaigns, this time it has been designed and implemented uniquely by the actor.

While the aforementioned attack chains are expressly engineered for the Windows environment, there is evidence that APT31 has set its sights on Linux systems as well.

Earlier this month, the AhnLab Security Emergency Response Center (ASEC) uncovered attacks likely carried out by the adversary against South Korean companies with the goal of infecting the machines with a backdoor called Rekoobe.

Rekoobe is a backdoor that can receive commands from a [command-and-control] server to perform various features such as downloading malicious files, stealing internal files from a system, and executing reverse shell, ASEC said.

While it may appear simple in structure, it employs encryption to evade network packet detection and can perform a variety of malicious behaviors through commands from the threat actor.

 

(c) Thin

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:04 am, Mai 19, 2025
Wetter-Symbol 13°C
L: 12° | H: 14°
overcast clouds
Luftfeuchtigkeit: 76 %
Druck: 1021 mb
Wind: 8 mph ENE
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:02 am
Sonnenuntergang: 8:51 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
12° | 14°°C 0 mm 0% 12 mph 66 % 1021 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
10° | 22°°C 0 mm 0% 10 mph 67 % 1022 mb 0 mm/h
Mi. Mai 21 10:00 pm
Wetter-Symbol
13° | 21°°C 0.2 mm 20% 9 mph 64 % 1020 mb 0 mm/h
Do. Mai 22 10:00 pm
Wetter-Symbol
11° | 18°°C 0 mm 0% 11 mph 64 % 1023 mb 0 mm/h
Fr. Mai 23 10:00 pm
Wetter-Symbol
7° | 18°°C 0.7 mm 70% 11 mph 77 % 1023 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
14° | 17°°C 0 mm 0% 9 mph 66 % 1021 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
17° | 19°°C 0 mm 0% 12 mph 52 % 1020 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 10 mph 46 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
13° | 13°°C 0 mm 0% 7 mph 61 % 1021 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
10° | 10°°C 0 mm 0% 5 mph 66 % 1022 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
10° | 10°°C 0 mm 0% 6 mph 67 % 1021 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 7 mph 63 % 1022 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 7 mph 46 % 1022 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,218.90
-0.73%
Ethereum(ETH)
€2,147.57
-4.66%
Fesseln(USDT)
€0.89
0.00%
XRP(XRP)
€2.06
-4.27%
Solana(SOL)
€144.53
-5.69%
USDC(USDC)
€0.89
0.00%
Dogecoin(DOGE)
€0.193964
-3.35%
Shiba Inu(SHIB)
€0.000013
-5.15%
Pepe(PEPE)
€0.000012
-3.11%
Peanut das Eichhörnchen(PNUT)
€0.282771
-11.92%
Nach oben scrollen