DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Incidents

Tick targets East Asian DLP company

March 16, 2023
Reading Time: 2 mins read
in Incidents

 

Tick, a China-aligned cyberespionage actor, has been linked to the compromise of an East Asian data-loss prevention (DLP) company that caters to government and military entities.

The attackers gained access to the company’s internal update servers to deliver malware, and trojanized installers of legitimate tools used by the company.

Tick has primarily targeted government, manufacturing, and biotechnology firms in Japan since at least 2006, but has also gone after lesser-known targets in Russia, Singapore, and China.

The group is believed to have gained access to the network of an East Asian software developer company through unknown means, followed by deploying a tampered version of a legitimate application called Q-Dir to drop an open source VBScript backdoor named ReVBShell, in addition to a previously undocumented downloader named ShadowPy. The attack also included variants of a Delphi backdoor called Netboy and another downloader named Ghostdown.

In February and June 2022, trojanized Q-Dir installers were transferred via remote support tools to two of the company’s customers, an engineering and a manufacturing firm located in East Asia. The goal was not to perform a supply chain attack against the downstream customers but rather that the rogue installer was unknowingly used as part of technical support activities.

The incident is also likely related to another unattributed cluster in May 2022 that involved the use of Microsoft Compiled HTML Help (.CHM) files to drop the ReVBShell implant.

Tick’s attack methodology typically involves spear-phishing emails and strategic web compromises as an entry point.

The group is known for its use of backdoors and downloaders to maintain persistent access, as well as deploying malicious loader DLLs along with legitimate signed applications vulnerable to DLL search-order hijacking.

These tactics have enabled Tick to remain active for more than a decade and pose a significant threat to government and military entities in East Asia and beyond.

Read More

Tags: AsiaBackdoorChinaCyber AttacksCYBER THREATScyberespionageDLL hijackingincidentsIncidents 2023March 2023RansomwaresRussiaSingaporeVulnerabilities
0
VIEWS
ADVERTISEMENT

Related Posts

LockBit Ransomware Targets Sheriff’s Office

LockBit Ransomware Targets Sheriff’s Office

March 31, 2023
NCB Management Services reports data breach

NCB Management Services reports data breach

March 31, 2023
Misconfigured Microsoft app allowed attacks

Misconfigured Microsoft app allowed attacks

March 31, 2023
Hacking group tied to Russia & Belarus

Hacking group tied to Russia & Belarus

March 31, 2023

More Articles

Document

A Usability Study of Five Two-Factor Authentication Methods

January 6, 2022
Alerts

New Threat Actor WIP26 Targeting Telecom Service Providers in the Middle East

February 16, 2023
Alerts

HPE security advisory (AV22-252)

May 5, 2022
Course

SOCIAL ENGINEERING TRAINING

January 26, 2021

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.