DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Alerts

Chinese hackers target SE Asian governments

March 8, 2023
Reading Time: 2 mins read
in Alerts

 

Chinese state-backed hacking group Sharp Panda has been found to be targeting government entities in Vietnam, Thailand, and Indonesia with a new version of the ‘Soul’ malware framework.

The campaign, identified by Check Point, began in late 2022 and continues through 2023, using spear-phishing attacks with malicious DOCX file attachments to deploy the RoyalRoad RTF kit to drop malware on the host.

The TTPs and tools used are consistent with previously seen activities by Sharp Panda, leading Check Point to attribute the latest espionage operation to state-backed Chinese hackers.

The Soul malware establishes a connection with the C2 and waits for additional modules that will extend its functionality. The new version analyzed by Check Point features a “radio silence” mode that allows the threat actors to specify the hours of the week that the backdoor should not communicate with the command and control server, likely to evade detection during the victim’s working hours.

Moreover, the new variant implements a custom C2 communication protocol that uses various HTTP request methods, including GET, POST, and DELETE.

Soul’s communication with the C2 begins by registering itself and sending victim fingerprinting data, after which it enters an infinite C2 contacting loop.

The commands it may receive during these communications concern loading additional modules, collecting and resending enumeration data, restarting the C2 communication, or exiting its process.

Check Point did not sample additional modules that might perform more specialized functions such as file actions, data exfiltration, keylogging, screenshot capturing, etc.

The Soul framework was first seen in the wild in 2017 and subsequently tracked throughout 2019 in Chinese espionage campaigns conducted by threat actors with no obvious links to Sharp Panda.

Despite the overlaps in the use of the tool, Check Point’s recent findings show that Soul is still under active development and deployment.

The use of malware like Soul highlights the need for organizations to remain vigilant and employ strong cybersecurity measures, including updating software regularly, conducting regular employee training, and deploying robust anti-malware tools.

Read More

Tags: AlertsAlerts 2023Check PointChinaEspionage campaignGovernmentIndonesiaMalwareMarch 2023Sharp PandaSoulThailandVietnam
0
VIEWS
ADVERTISEMENT

Related Posts

OpenAI fixes vulnerabilities in ChatGPT

OpenAI fixes vulnerabilities in ChatGPT

March 30, 2023
Vendors Alert 3CX Supply Chain Attack

Vendors Alert 3CX Supply Chain Attack

March 30, 2023
Mozilla Fixes Thunderbird Vulnerability

Mozilla Fixes Thunderbird Vulnerability

March 30, 2023
Chinese state hackers target Linux servers

Chinese state hackers target Linux servers

March 30, 2023

More Articles

Malware Analysis Techniques: Tricks for the triage of adversarial software

December 13, 2021
Quotes

“The certification of 5G networks emerges as…”

April 2, 2021
Course

Data Privacy in Education

December 17, 2021
Tool

Palo Alto NGFW

August 11, 2022

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.