DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home News

Cyber Espionage by China’s RedHotel Hackers

August 10, 2023
Reading Time: 2 mins read
in News

Hackers affiliated with China’s Ministry of State Security (MSS) have orchestrated a series of cyber attacks spanning 17 countries across Asia, Europe, and North America from 2021 to 2023. The campaign, attributed to a group known as RedHotel, involves a range of activities linked to various codenames like Aquatic Panda and Bronze University.

This sophisticated operation, described by cybersecurity firm Recorded Future, has targeted a wide array of sectors including academia, aerospace, government, media, telecommunications, and research, with government organizations being the primary victims. RedHotel’s multifaceted approach combines intelligence gathering and economic espionage, spotlighting its persistence, operational intensity, and global reach.

Trend Micro, in early 2022, characterized RedHotel as a highly skilled and dangerous threat actor driven by motives of cyberespionage and financial gain. The group’s cyber campaign encompasses the exploitation of Log4Shell vulnerabilities and attacks against telecommunications, academia, research, and government entities in countries such as Nepal, the Philippines, Taiwan, and Hong Kong. RedHotel’s attack tactics involve the weaponization of public-facing applications for initial access, along with the use of offensive security tools like Cobalt Strike and Brute Ratel C4, coupled with customized malware strains such as FunnySwitch, ShadowPad, Spyder, and Winnti.

Of note is RedHotel’s intricate operational methodology, which employs a multi-tiered infrastructure for both initial reconnaissance and sustained network access via command-and-control servers. This operation heavily relies on NameCheap for domain registration.

Notably, the group leveraged a stolen code signing certificate from a Taiwanese gaming company in a late 2022 campaign to sign a DLL file responsible for deploying BRc4. This development highlights the aggressive and extensive cyber-espionage activities of the RedHotel group, prompting concerns over the scope of China’s state-sponsored cyber threats.

Source:
  • RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale
Tags: August 2023Chinacyber espionageCyberattackCybersecurityGovernmentHackerHackersNewsNews 2023RedHotel
4
VIEWS
ADVERTISEMENT

Related Posts

Millions of Sensitive Files Exposed

Millions of Sensitive Files Exposed

September 29, 2023
Cloud Security Challenges Persist

Cloud Security Challenges Persist

September 29, 2023
Security Researcher Faces Legal Challenge

Security Researcher Faces Legal Challenge

September 29, 2023
FDA’s Medical Device Cybersecurity Guide

FDA’s Medical Device Cybersecurity Guide

September 29, 2023

More Articles

Incidents

IT Services Provider Hit by Donut Gang

September 22, 2023
Alerts

Lazarus Group Threat to Healthcare

September 22, 2023
Cyber Briefing

September 22, 2023 – Cyber Briefing

September 22, 2023
Alerts

Chinese-Language Phishing Campaigns

September 20, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.