• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

‘Bitter’ espionage hackers target Chinese nuclear energy orgs

Bill Toulas by Bill Toulas
March 24, 2023
Reading Time: 3 mins read
0
Gootkit malware abuses VLC to infect healthcare orgs with Cobalt Strike

Hacker typing at a keyboard

RELATED POSTS

Clop ransomware claims responsibility for MOVEit extortion attacks

Microsoft’s Outlook.com is down again on mobile, web

New tool scans iPhones for ‘Triangulation’ malware infection

A cyberespionage hacking group tracked as ‘Bitter APT’ was recently seen targeting the Chinese nuclear energy industry using phishing emails to infect devices with malware downloaders.

Bitter is a suspected South Asian hacking group known to target high-profile organizations in the energy, engineering, and government sectors in the Asian-Pacific region.

In May 2022, Bitter APT was spotted using spear phishing emails with malicious XLSX document attachments to load a trojan named ‘ZxxZ’ on targets in Southeast Asia.

In August 2022, Meta reported that Bitter APT was using a new Android spyware tool named ‘Dracarys’ against users in New Zealand, India, Pakistan, and the United Kingdom.

This hacking campaign was discovered by threat analysts at Intezer, who attribute it to Bitter APT based on the observed TTPs (tactics, techniques, and procedures) that match those of past campaigns by the same threat actor.

Targeting China’s nuclear field

In the new campaign found by Intezer, Bitter sends emails pretending to be from the Embassy of Kyrgyzstan in Beijing to various Chinese nuclear energy companies and academics related to that field.

Buy JNews
ADVERTISEMENT

The email pretends to be an invitation to a conference about nuclear energy supposedly held by the Kyrgyz Embassy, the International Atomic Energy Agency (IAEA), and the China Institute of International Studies (CIIS).

Phishing email body
Phishing email body (Intezer)

The name that signs the email is genuine, belonging to an official of the Kyrgyzstan Ministry of Foreign Affairs, showing Bitter APT’s attention to details that help add legitimacy to their communications.

The recipients are urged to download the email’s RAR attachment which supposedly contains an invitation card for the conference but, in reality, has either a Microsoft Compiled HTML Help file (CHM) or a malicious Excel document.

Dropping payloads

In most cases, Bitter APT uses a CHM payload that executes commands to create scheduled tasks on the compromised system and download the next stage.

When an Excel document hides in the downloaded RAR attachments, the scheduled task is added by exploiting an older Equation Editor vulnerability triggered by the opening of the malicious document.

Scheduled task
Scheduled task (Intezer)

Intezer comments that the threat actor likely prefers the CHM payloads because those do not require the target to use a vulnerable version of Microsoft Office, can bypass static analysis thanks to its LZX compression, and requires minimal user interaction to operate.

The second-stage payload is an MSI or a PowerShell file if a CHM payload is used or an EXE file in the case of the Excel document payload.

Malicious PowerShell in the CHM file
Malicious PowerShell in the CHM file (Intezer)

To evade detection and exposure, the second-stage payloads are empty. However, when the first-stage payloads send information about the breached device to the attacker’s command and control server, it will determine if it is a valuable target and deliver actual malware to the compromised system.

Empty MSI payloads
Empty MSI payloads (Intezer)

Intezer’s analysts could not retrieve any actual payloads delivered in this campaign but hypothesized that they might include keyloggers, RATs (remote access tools), and info-stealers.

Bitter APT's complete infection chain
Bitter APT’s complete infection chain (Intezer)

Risky attachments

CHM files were once popular for software documentation and help files, but are not commonly used anymore, let alone in email communications.

Recipients of emails should exercise heightened vigilance when encountering CHM files within attached archives, as these files can potentially harbor malicious content.

Finally, archives themselves should also be treated with suspicion, as they can bypass anti-virus scans, and hence the likelihood of them being malicious is high.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

Hackers exploit Control Web Panel flaw to open reverse shells
Cyber Security

Clop ransomware claims responsibility for MOVEit extortion attacks

June 5, 2023
Outlook for Mac now free, Microsoft 365 subscription not needed
Cyber Security

Microsoft’s Outlook.com is down again on mobile, web

June 5, 2023
New tool scans iPhones for ‘Triangulation’ malware infection
Cyber Security

New tool scans iPhones for ‘Triangulation’ malware infection

June 5, 2023
New AhRat Android malware hidden in app with 50,000 installs
Cyber Security

SpinOk Android malware found in more apps with 30 million installs

June 5, 2023
GIGABYTE releases new firmware to fix recently disclosed security flaws
Cyber Security

GIGABYTE releases new firmware to fix recently disclosed security flaws

June 5, 2023
Researchers secretly helped decrypt Zeppelin ransomware for 2 years
Cyber Security

KeePass v2.54 fixes bug that leaked cleartext master password

June 5, 2023

Recommended Stories

DOGE: Bullish momentum stirs after midweek lows

DOGE: Bullish momentum stirs after midweek lows

June 4, 2023
Google finds 18 baseband zero-day bugs in Samsung Exynos chipsets

Google finds 18 zero-day vulnerabilities in Samsung Exynos chipsets

March 16, 2023
How will OKB react as OKX expands to Asian markets? Analyzing…

How will OKB react as OKX expands to Asian markets? Analyzing…

March 29, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Polygon zkEVM’s growth unhindered: What it means for MATIC
  • Polkadot announces new proposal; will DOT see a change of fate
  • PEPE’s hopes of a corrective bounce remain elusive

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?