The Earth Preta threat group has recently upgraded its attack techniques by leveraging removable drives to distribute malware, specifically using a variant of the HIUPAN worm. This shift in strategy marks a significant enhancement in their ability to spread malware, allowing Earth Preta to bypass traditional security defenses and target a wider range of victims. The HIUPAN worm acts as a key component in their attack chain, enabling the deployment of PUBLOAD, a tool used for system information collection and network mapping.
Researchers from Trend Micro have detailed how the HIUPAN worm propagates through removable drives by modifying the autorun registry entries to ensure persistence and conceal its presence. This method allows Earth Preta to infiltrate networks more effectively and evade detection. Once installed, PUBLOAD gathers critical data and facilitates the delivery of additional malware, including FDMTP for downloading further malicious payloads and PTSOCKET for exfiltrating data to remote servers.
Previously, Earth Preta relied on spear-phishing emails to deliver malware, but the new technique of using removable drives enables them to bypass certain security measures and reach a broader audience. The targeted countries in the Asia-Pacific (APAC) region include Myanmar, the Philippines, Vietnam, Singapore, Cambodia, and Taiwan, with a focus on government and foreign affairs sectors. This approach not only increases the scale of their attacks but also enhances their ability to execute rapid and stealthy operations.
The incorporation of HIUPAN and its associated tools demonstrates Earth Preta’s evolving tactics and highlights the need for enhanced security measures. The use of removable drives and sophisticated malware tools like PUBLOAD, FDMTP, and PTSOCKET underscores the importance of vigilance and robust defenses against such advanced threats. As Earth Preta continues to refine its methods, organizations in the APAC region must remain alert to protect against these increasingly sophisticated attacks.
Reference: