Advanced Persistent Threat, targets Southern African organisation in espionage attack, Kaspersky raises alarm

Kaspersky Managed Detection and Response experts (www.Kaspersky.co.za) have observed a cyber espionage attack


By: | on | 242 views
Topic: News


Advanced Persistent Threat, targets Southern African organisation in espionage attack, Kaspersky raises alarm

Business

Kaspersky Managed Detection and Response experts (www.Kaspersky.co.za) have observed a cyber espionage attack on an organisation in Southern African and have linked it to the Chinese-speaking APT41 group.

Although the threat actor has shown limited activity in Southern Africa, Kaspersky revealed that the cyber attackers, targeted government IT services in one of the countries in the region, attempting to steal sensitive corporate data — including credentials, internal documents, source code, and communications.

APT (Advanced Persistent Threat) is a category of threat actors known for carrying out concerted, stealthy, and ongoing attacks against specific organisations, as opposed to opportunistic, isolated incidents that account for most cybercriminal activity.

The adversaries’ techniques observed during the attack in Southern Africa allowed Kaspersky to attribute it to the Chinese-speaking APT41 group with a high confidence.

The primary goal of the attack was cyber espionage, which is typical for this threat actor. The attackers attempted to collect sensitive data from the machines they compromised within the organisation’s network.

It is noteworthy that APT41 typically has been showing quite limited activity in the Southern African region. APT41 specialises in cyber espionage and targets organisations across various industries, including telecommunications providers, educational and healthcare institutions, IT, energy, and other sectors, with known activity in at least 42 countries.

Based on Kaspersky experts’ analysis, the attackers may have gained access to the organisation’s network through a web server exposed to the Internet. Using a credential harvesting technique – known in professional terms as registry dumping – the attackers obtained two corporate domain accounts: one with local administrator rights on all workstations and another belonging to a backup solution, which had domain administrator privileges. These accounts allowed the attackers to compromise additional systems within the organisation.

One of the stealers used for data collection was a modified Pillager utility, designed for exporting and decrypting data. The attackers compiled its code from an executable file into a Dynamic Link Library (DLL). With it, they aimed to gather saved credentials from browsers, databases, administrative tools, as well as project source code, screenshots, active chat sessions and their data, email correspondence, lists of installed software, operating system credentials, Wi-Fi credentials, and other information.

The second stealer used during the attack was Checkout. In addition to saved credentials and browser history, it was also capable of collecting information on downloaded files and browser-stored credit card data. The attackers also used the RawCopy utility and a version of Mimikatz compiled as a Dynamic Link Library (DLL) to dump registry files and credentials, as well as Cobalt Strike for Command and Control (C2) communication on compromised hosts.

“Interestingly, as one of their C2 communication channels besides Cobalt Strike, the attackers chose the SharePoint server within the victim's infrastructure. They communicated with it using custom C2 agents connected with a web-shell. They may have chosen SharePoint because it was an internal service already present in the infrastructure and unlikely to raise suspicion. Moreover, in that case, it probably offered the most convenient way to exfiltrate data and control compromised hosts through a legitimate communication channel,” explains Denis Kulik, Lead SOC Analyst at Kaspersky Managed Detection and Response service.

“In general, defending against such sophisticated attacks is impossible without comprehensive expertise and continuous monitoring of the entire infrastructure. It is essential to maintain full security coverage across all systems with solutions capable of automatically blocking malicious activity at an early stage — and to avoid granting user accounts excessive privileges,” comments Denis Kulik.

To mitigate or prevent similar attacks, organisations are advised to follow these best practices:

  • Ensure that security agents are deployed on all workstations within the organisation without exception, to enable timely incident detection and minimise potential damage.
  • Review and control service and user account privileges, avoiding excessive rights assignments – especially for accounts used across multiple hosts within the infrastructure.
  • To protect the company against a wide range of threats, use solutions from the Kaspersky Next (https://apo-opa.co/44EI2e3) product line that provide real-time protection, threat visibility, investigation and the response capabilities of EDR and XDR for organisations of any size and industry. Depending on your current needs and available resources, you can choose the most relevant product tier and easily migrate to another one if your cybersecurity requirements are changing.
  • Adopt managed security services by Kaspersky such as Compromise Assessment (https://apo-opa.co/4m8aElL), Managed Detection and Response (MDR) (https://apo-opa.co/4m6do37) and / or Incident Response (https://apo-opa.co/44VsAsP), covering the entire incident management cycle – from threat identification to continuous protection and remediation.  They help to protect against evasive cyberattacks, investigate incidents and get additional expertise even if a company lacks cybersecurity workers.
  • Provide your InfoSec professionals with an in-depth visibility into cyberthreats targeting your organisation. The latest Kaspersky Threat Intelligence (https://apo-opa.co/3TQbRlK) will provide them with rich and meaningful context across the entire incident management cycle and helps them identify cyber risks in a timely manner.

A detailed analysis of the incident is available on Securelist (https://apo-opa.co/46mfGGS).


Copyright: Fresh Angle International (www.freshangleng.com)
ISSN 2354 - 4104


Sponsored Ad




Our strategic editorial policy of promoting journalism, anchored on the tripod of originality, speed and efficiency, would be further enhanced with your financial support. Your kind contribution, to our desire to become a big global brand, should be credited to our account:

Fresh Angle Nig. Ltd
ACCOUNT NUMBER: 0130931842.
BANK GTB.



Sponsored
Sponsored Ads