แฮกเกอร์ชาวจีนปกปิดร่องรอยและกำจัดมัลแวร์เมื่อสองสามวันก่อนที่จะถูกตรวจพบ

FireEye specialists drew attention to the strange behavior of Chinese hackers, who, in an attempt to cover their tracks, remove malware shortly before detection.

ตามที่นักวิจัย, two hack groups are using a zero-day vulnerability in Pulse Secure VPN to attack the networks of American defense contractors and government organizations around the world.

According to FireEye, the hacks started way back in August 2020, when the first hack group, which the company tracks as UNC2630, targeted US defense contractors and European organizations. According to analysts, these hackersact on behalf of the Chinese government and may have connections with APT5,that is another well-known Chinese cyber espionage group.

In October 2020, a second group of hackers joined the attacks (FireEye assigned it the ID UNC2717), but the experts knew practically nothing about it.

In both cases, the attackers installed web shells on vulnerable devices, and then used them to go to the victimsinternal networks, from where they stole credentials, letters and confidential documents.

Now in a new report, FireEye writes that further investigation of these attacks helped to discover something strange: at least one of the groups involved in the incidents began to remove their malware from infected networks three days before disclosure.

Between April 17 และ 20, 2021, Mandiant specialists observed that UNC2630 gained access to dozens of compromised devices and removed web shells such as ATRIUM and SLIGHTPULSE”, — analysts write.

The actions of the cybercriminals look suspicious and raise questions, ตัวอย่างเช่น, if the attackers could know about the interest from FireEye. แน่นอน, the removal of the malware could have been a coincidence, but if UNC2630 participants knew that FireEye was investigating some of the networks they had compromised, it appears that the hackers deliberately backed down and removed evidence to protect other operations from the researchers.

FireEye also reports that it has discovered new details of this hacking campaign. ดังนั้น, experts found four additional strains of malware (in addition to the 12 previously described).

  • BLOODMINE — Pulse Secure Connect log file analysis utility. Retrieves information related to logins, post IDs and web requests and copies the corresponding data to another file.
  • BLOODBANK — A credential stealing utility that parses two files containing password hashes or passwords in an open test and expects the output file to be specified on the command line.
  • CLEANPULSE — it is a memory patching utility that can be used to prevent certain log events from occurring. It was found along with the ATRIUM web shell.
  • RAPIDPULSE — A web shell capable of reading arbitrary files. Like other web shells, RAPIDPULSE is a modification of the legitimate Pulse Secure file. Can serve as a loader for encrypted files.

นอกจากนี้, FireEye continues to work with the developers of Pulse Secure to identify compromised devices and their owners. This work allowed analysts to learn more about the targets of the attackers. ดังนั้น, according to new data, most of the victims are organizations based in the United States (others are located in European countries). While the attacks were previously thought to have targeted defense contractors and government agencies, it has now become clear that the attackers also targeted telecommunications, finance and transportation companies.

Whereas earlier FireEye analysts wrote that only UNC2630 can have links with the Chinese government, now they are confident that both groups are engaged in cyber espionage andsupport the key priorities of the Chinese government.

ฉันขอเตือนคุณว่าฉันเขียนแบบนั้นด้วย XCSSET malware uses 0-day attacks in macOS.

เฮลก้า สมิธ

ฉันสนใจวิทยาการคอมพิวเตอร์มาโดยตลอด, โดยเฉพาะความปลอดภัยของข้อมูลและธีม, ซึ่งเรียกกันในปัจจุบันว่า "วิทยาศาสตร์ข้อมูล", ตั้งแต่วัยรุ่นตอนต้นของฉัน. ก่อนจะมาอยู่ในทีมกำจัดไวรัสในตำแหน่งหัวหน้าบรรณาธิการ, ฉันทำงานเป็นผู้เชี่ยวชาญด้านความปลอดภัยทางไซเบอร์ในหลายบริษัท, รวมถึงหนึ่งในผู้รับเหมาของ Amazon. ประสบการณ์อื่น: ฉันได้สอนในมหาวิทยาลัยอาร์เดนและรีดดิ้ง.

ทิ้งคำตอบไว้

เว็บไซต์นี้ใช้ Akismet เพื่อลดสแปม. เรียนรู้วิธีประมวลผลข้อมูลความคิดเห็นของคุณ.

ปุ่มกลับไปด้านบน