Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers

Teilen:

A suspected Chinese threat actor targeted a large U.S. organization earlier this year as part of a four-month-long intrusion.

According to Broadcom-owned Symantec, the first evidence of the malicious activity was detected on April 11, 2024 and continued until August. However, the company doesn’t rule out the possibility that the intrusion may have occurred earlier.

“The attackers moved laterally across the organization’s network, compromising multiple computers,” the Symantec Threat Hunter Team said in a report shared with The Hacker News.

“Some of the machines targeted were Exchange Servers, suggesting the attackers were gathering intelligence by harvesting emails. Exfiltration tools were also deployed, suggesting that targeted data was taken from the organizations.”

The name of the organization that was impacted by the persistent attack campaign was not disclosed, but noted that the victim has a significant presence in China.

The links to China as the potential culprit stem from the use of DLL side-loading, which is a preferred tactic among various Chinese threat groups, and the presence of artifacts previously identified as employed in connection with a state-sponsored operation codenamed Crimson Palace.

Another point of interest is that the organization was targeted in 2023 by an attacker with tentative links to another China-based hacking crew called Daggerfly, which is also referred to as Bronze Highland, Evasive Panda, and StormBamboo.

Besides using DLL side-loading to execute malicious payloads, the attack entails the use of open-source tools like FileZilla, Impacket, and PSCP, while also employing living-off-the-land (LotL) programs like Windows Management Instrumentation (WMI), PsExec, and PowerShell.

The exact initial access mechanism used to breach the network remains unknown at this stage. That said, Symantec’s analysis has found that the machine on which the earliest indicators of compromise were detected included a command that was run via WMI from another system on the network.

“The fact that the command originated from another machine on the network suggests that the attackers had already compromised at least one other machine on the organization’s network and that the intrusion may have begun prior to April 11,” the company said.

Some of the other malicious activities that were subsequently performed by the attackers ranged from credential theft and executing malicious DLL files to targeting Microsoft Exchange servers and downloading tools such as FileZilla, PSCP, and WinRAR.

“One group the attackers were particularly interested in is ‘Exchange servers,’ suggesting the attackers were attempting to target mail servers to collect and possibly exfiltrate email data,” Symantec said.

The development comes as Orange Cyberdefense detailed the private and public relationships within the Chinese cyber offensive ecosystem, while also highlighting the role played by universities for security research and hack-for-hire contractors for conducting attacks under the direction of state entities.

“In many instances, individuals linked to the [Ministry of State Security] or [People’s Liberation Army] units register fake companies to obscure the attribution of their campaigns to the Chinese state,” it said.

“These fake enterprises, which engage in no real profit-driven activities, may help procure digital infrastructure needed for conducting the cyberattacks without drawing unwanted attention. They also serve as fronts for recruiting personnel for roles that support hacking operations.”

Quelle

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
9:46 am, Juni 15, 2025
Wetter-Symbol 18°C
L: 17° | H: 20°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 71 %
Druck: 1022 mb
Wind: 10 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 40%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:42 am
Sonnenuntergang: 9:19 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
17° | 20°°C 0 mm 0% 12 mph 74 % 1025 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
14° | 25°°C 0 mm 0% 9 mph 85 % 1028 mb 0 mm/h
Di. Juni 17 10:00 pm
Wetter-Symbol
16° | 26°°C 0 mm 0% 10 mph 83 % 1027 mb 0 mm/h
Mi. Juni 18 10:00 pm
Wetter-Symbol
15° | 27°°C 0 mm 0% 7 mph 76 % 1026 mb 0 mm/h
Do. Juni 19 10:00 pm
Wetter-Symbol
17° | 28°°C 0 mm 0% 10 mph 76 % 1027 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
18° | 19°°C 0 mm 0% 9 mph 71 % 1022 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
19° | 22°°C 0 mm 0% 9 mph 65 % 1022 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
22° | 24°°C 0 mm 0% 11 mph 49 % 1022 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
21° | 21°°C 0 mm 0% 12 mph 54 % 1023 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 8 mph 74 % 1025 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
15° | 15°°C 0 mm 0% 5 mph 84 % 1027 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
14° | 14°°C 0 mm 0% 3 mph 85 % 1027 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 3 mph 76 % 1028 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,140.71
0.19%
Ethereum(ETH)
€2,184.50
-0.45%
Fesseln(USDT)
€0.87
-0.01%
XRP(XRP)
€1.86
-1.20%
Solana(SOL)
€125.92
-0.20%
USDC(USDC)
€0.87
0.00%
Dogecoin(DOGE)
€0.151478
-1.09%
Shiba Inu(SHIB)
€0.000010
-1.19%
Pepe(PEPE)
€0.000010
-0.38%
Nach oben scrollen