Tuesday, June 24, 2025
  • Login
Whats Current In
Advertisement
  • Cyber Security
No Result
View All Result
  • Cyber Security
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Chinese Cyberspies Employ Ransomware in Attacks for Diversion

wcisrvadm by wcisrvadm
June 27, 2024
in Cyber Security
0
Chinese Cyberspies Employ Ransomware in Attacks for Diversion
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

This post was originally published on this site

Ransomware

Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a financial reward as a secondary goal to data theft.

A joint report from SentinelLabs and Recorded Future analysts presents the case of ChamelGang, a suspected Chinese advanced persistent threat (APT) that has been using the CatB ransomware strain in attacks that impact high-profile organizations worldwide.

A separate activity cluster uses BestCrypt and Microsoft BitLocker to achieve similar goals, although attribution is not clear.

ChamelGang targeting

ChamelGang is also known as CamoFei and has targeted government organizations and critical infrastructure entities between 2021 and 2023.

The group uses sophisticated techniques to gain initial access, for reconnaissance and lateral movement, and to exfiltrate sensitive data.

In an attack in November 2022, the threat actors targeted the Presidency of Brazil and compromised 192 computers. The adversary relied on standard reconnaissance tools to map the network and to gather information on critical systems.

In the last stage of the attack, ChamelGang deployed CatB ransomware on the network, dropping ransom notes at the beginning of each encrypted file. They provided a ProtonMail address for contact and a Bitcoin address for payment.

CatB ransom note
CatB ransom note
Source: SentinelLabs

The attack was initially attributed to TeslaCrypt but SentinelLabs and Recorded Future present new evidence that point to ChamelGang.

During another incident in late 2022, ChamelGang breached the All India Institute Of Medical Sciences (AIIMS) public medical research university and hospital. The threat actor used CatB ransomware once again, causing major disruptions in healthcare services.

The researchers believe that two other attacks, against a government entity in East Asia and an aviation organization in the Indian subcontinent are also the work of ChamelGang, based on the use of known TTPs, publicly available tooling seen in previous engagements, and their custom malware BeaconLoader.

BestCrypt and BitLocker

A separate cluster of activities spotted by SentinelLabs and Recorded Future encrypts files using Jetico BestCrypt and Microsoft BitLocker instead of CatB ransomware.

The researchers say that these intrusions impacted 37 organizations, most of them in North America. Other victims were in South America and Europe.

By comparing evidence in reports from other cybersecurity companies, the researchers discovered overlaps with past intrusions linked to suspected Chinese and North Korean APTs.

Intrusions detected
BestCrypt and BitLocker powered intrusions detected overtime
Source: SentinelLabs

Typically, BestCrypt was used to target server endpoints in an automated, serial encryption manner, while BitLocker was deployed against workstations, with unique recovery passwords used in each case.

The attackers also used the China Chopper webshell, a custom variant of the miPing tool, and leveraged Active Directory Domain Controllers (DCs) as footholds.

The analysts report these attacks lasted for nine days on average, while some had a short duration of just a couple of hours, indicating familiarity with the targeted environment.

A reason for involving ransomware in cyberespionage attacks could be that it provides strategic and operational benefits that blur the lines between APT and cybercriminal activity, which can lead to incorrect attribution or as a means to conceal the data collection nature of the operation.

Attributing past ransomware incidents to a cyberespionage threat actor as ChamelGang is new and shows that adversaries are changing tactics to cover their tracks while still attaining their goals.

Previous Post

Optiv Report Shows Nearly 60% Increase in Security Budgets as Most Organizations Report Cyber Breaches and Incidents

Next Post

Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application

wcisrvadm

wcisrvadm

Next Post
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application

Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application

Recent Posts

  • New FileFix attack weaponizes Windows File Explorer for stealthy commands
  • Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
  • How Today’s Pentest Models Compare and Why Continuous Wins
  • How the US Military Is Redefining Zero Trust
  • US House bans WhatsApp on staff devices over security concerns

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024

Categories

  • Cyber Security

Browse by Category

  • Cyber Security
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Cyber Security

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.