Search

Chinese APT Group Deploys 'Most Sophisticated' Shellcode - BankInfoSecurity.com

tokger.blogspot.com

Cybercrime , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime

Newly Discovered BendyBear's Advanced Features Include Anti-Analysis Capabilities
Chinese APT Group Deploys ‘Most Sophisticated’ Shellcode

BlackTech, a Chinese advanced persistent threat group, is deploying a sophisticated new shellcode called BendyBear as part of its latest espionage campaign security firm Palo Alto Networks reports.

See Also: Rapid Digitization and Risk: A Roundtable Preview

BendyBear is a stage-zero implant that has been designed to download more advanced malware from its command-and-control server. Palo Alto researchers describe the malware as one of the "most sophisticated, well-engineered and difficult-to-detect samples of shellcode employed by an advanced persistent threat group."

The researchers' report notes: "The BendyBear sample was determined to be x64 shellcode for a stage-zero implant whose sole function is to download a more robust implant from a command and control (C2) server."

The malware has been deployed by the group as part of cyberespionage campaigns across Southeast Asia.

BendyBear Capabilities

BendyBear is described as a new class of shellcode with unique capabilities, including:

  • Transmitting payloads in modified RC4-encrypted chunks, making the decryption of the code more difficult;
  • Leveraging existing Windows registry key that is enabled by default in Windows 10 to store configuration data;
  • Generating unique session keys for each connection to the C2 server;
  • Using a polymorphic approach to thwart memory analysis and evade signaturing.

Palo Alto Networks notes BendyBear's infrastructure overlaps with that of the WaterBear malware family, which BlackTech has used sincee 2009.

Unlike WaterBear, however, BendyBear comes with more advanced capabilities, including API hashing, process hiding and network traffic filtering capabilities.

BlackTech, also known as CircuitPanda, Temp.Overboard and Huapi, is an APT group that has previously targeted victims in East Asia, particularly Taiwan, and in Japan and Hong Kong as part of cyberespionage campaigns. Officials in Taiwan believe the hacking group has connections to China and its government, Reuters reported in August 2020.

In October 2020, researchers at security firm Symantec revealed that the group targeted organizations in the U.S. and Asia using a previously unseen malware backdoor. Symantec notes the malware has been designed to steal files, intellectual property and government documents from its victims.(see: APT Group Wages Cyber Espionage Campaign)

In August, Taiwan's CyberSecurity Investigation Office revealed that BlackTech was one of the groups that breached the networks of 10 government agencies.

Prior to this, Japan's Computer Security Incident Response Team disclosed more details of Linux malware deployed by BlackTech with a custom communication protocol and additional characteristics.




February 11, 2021 at 01:42AM
https://ift.tt/2Om3pvT

Chinese APT Group Deploys 'Most Sophisticated' Shellcode - BankInfoSecurity.com

https://ift.tt/2WinW4G


Bagikan Berita Ini

0 Response to "Chinese APT Group Deploys 'Most Sophisticated' Shellcode - BankInfoSecurity.com"

Post a Comment

Powered by Blogger.