www.zdnet.com Open in urlscan Pro
2a04:4e42:4c::666  Public Scan

URL: https://www.zdnet.com/article/chinese-hacker-group-caught-bypassing-2fa/
Submission: On November 03 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="c-smartSearch_form"><input aria-label="Search" placeholder="What are you looking for?" type="search" autocomplete="off" aria-autocomplete="list" aria-activedescendant="" aria-controls="c-searchSmartSearchResults" name="query" value="">
  <button type="submit"><span class="search-go">Go</span> <svg>
      <use xlink:href="#arrow-thin" aria-hidden="false"></use>
    </svg></button></form>

Text Content

/>
X


Trending
 * iPhone 14 Pro wins with substance over sizzle this year
 * How to convert your home's old TV cabling into powerful Ethernet lines
 * I put the Apple Watch Ultra through a Tough Mudder: Here's how it held up
 * What quiet quitting is really about
 * Welcome to ZDNET's next chapter
 * 

 * Best VPN services
 * Best web hosting
 * Best electric cars
 * Best Samsung phone 2022
 * The 7 best computers of 2022
 * 

 * Innovation
 * Working from Home
 * Cloud
 * Windows 11
 * ZDNET Recommends
   

Innovation
 * See all Innovation
 * AI & Robotics
 * Autonomous Vehicles
 * Computing
 * Electric Vehicles
 * Makers
 * 

 * Metaverse
 * Open Source
 * Productivity
 * Quantum Computing
 * Smartphones
 * Social Media
 * 

 * Services & Software
 * Space
 * Wearables
 * 

 * 5G arrives: Understanding what it means for you
 * Tech skills: Upgrade your job
 * Accelerate your tech game Paid Content
   

Home & Office
 * See all Home &
   Office
 * Energy
 * Home Entertainment
 * Kitchen & Household
 * Networking
 * Smart Home
 * 

 * Smart Office
 * Sustainability
 * Yard & Outdoors
 * 

 * The New Rules of Work
   

Business
 * See all Business
 * Amazon
 * Apple
 * Cloud
 * CXO
 * Data Centers
 * 

 * Developer
 * Digital Transformation
 * E Commerce
 * Edge Computing
 * Enterprise Software
 * Google
 * 

 * Internet of Things
 * Microsoft
 * SMB
 * 

 * Software development: Emerging trends and changing roles
 * Small Business Tech Essentials
   

Finance
 * See all Finance
 * Banking
 * Blockchain
 * Credit Cards
 * Taxes
 * 

 * The Future of Money
 * Financial Literacy 101
   

Education
 * See all Education
 * Bootcamps
 * Business & Management
 * Computers & Tech
 * MBA
 * Professional Development
 * 

 * How to switch careers to tech
 * How to stand out in a job interview
 * Mental health in the workplace
 * Productivity and time management
   

Security
 * See all Security
 * VPN
 * Cyber Threats
 * Password Manager
 * Ransomware
 * 

 * Securing the Cloud
   

tomorrow
belongs to those who embrace it
today
 * Asia
 * Australia
 * Europe
 * India
 * United Kingdom
 * United States
   

 * ZDNET France
 * ZDNET Germany
 * ZDNET Korea
 * ZDNET Japan
   

Go

Most Popular


 * See all topics
 * Deals
 * News
 * Newsletters
 * Videos
 * ZDNET Recommends
   

 * Trending
   iPhone 14 Pro wins with substance over sizzle this year How to convert your
   home's old TV cabling into powerful Ethernet lines I put the Apple Watch
   Ultra through a Tough Mudder: Here's how it held up What quiet quitting is
   really about Welcome to ZDNET's next chapter
   Best VPN services Best web hosting Best electric cars Best Samsung phone 2022
   The 7 best computers of 2022
   Innovation Working from Home Cloud Windows 11 ZDNET Recommends

 * Innovation
   See all Innovation AI & Robotics Autonomous Vehicles Computing Electric
   Vehicles Makers
   Metaverse Open Source Productivity Quantum Computing Smartphones Social Media
   Services & Software Space Wearables
   5G arrives: Understanding what it means for you Tech skills: Upgrade your job
   Accelerate your tech game Paid Content

 * Home & Office
   
   See all Home & Office Energy Home Entertainment Kitchen & Household
   Networking Smart Home
   Smart Office Sustainability Yard & Outdoors
   The New Rules of Work

 * Business
   See all Business Amazon Apple Cloud CXO Data Centers
   Developer Digital Transformation E Commerce Edge Computing Enterprise
   Software Google
   Internet of Things Microsoft SMB
   Software development: Emerging trends and changing roles Small Business Tech
   Essentials

 * Finance
   
   See all Finance Banking Blockchain Credit Cards Taxes
   The Future of Money Financial Literacy 101

 * Education
   
   
   See all Education Bootcamps Business & Management Computers & Tech MBA
   Professional Development
   How to switch careers to tech How to stand out in a job interview Mental
   health in the workplace Productivity and time management

 * Security
   
   
   See all Security VPN Cyber Threats Password Manager Ransomware
   Securing the Cloud

 * More
   
   
   See all topics Deals News Newsletters Videos ZDNET Recommends

Innovation
Home Innovation Security


CHINESE HACKER GROUP CAUGHT BYPASSING 2FA

Chinese state-sponsored group APT20 has been busy hacking government entities
and managed service providers.
Written by Catalin Cimpanu, Contributor on Dec. 22, 2019

 * 
 * 
 * 
 * 
 * 


MUST READ



I took my Pixel 7 Pro and DSLR to the zoo. The results surprised me

Read now

Security researchers say they found evidence that a Chinese government-linked
hacking group has been bypassing two-factor authentication (2FA) in a recent
wave of attacks.

The attacks have been attributed to a group the cyber-security industry is
tracking as APT20, believed to operate on the behest of the Beijing government,
Dutch cyber-security firm Fox-IT said in a report published last week.



The group's primary targets were government entities and managed service
providers (MSPs). The government entities and MSPs were active in fields like
aviation, healthcare, finance, insurance, energy, and even something as niche as
gambling and physical locks.


RECENT APT20 ACTIVITY

The Fox-IT report comes to fill in a gap in the group's history. APT20's hacking
goes back to 2011, but researchers lost track of the group's operations in
2016-2017, when they changed their mode of operation.

Fox-IT's report documents what the group has been doing over the past two years
and how they've been doing it.

According to researchers, the hackers used web servers as the initial point of
entry into a target's systems, with a particular focus on JBoss, an enterprise
application platform often found in large corporate and government networks.



APT20 used vulnerabilities to gain access to these servers, install web shells,
and then spread laterally through a victim's internal systems.

While on the inside, Fox-IT said the group dumped passwords and looked for
administrator accounts, in order to maximize their access. A primary concern was
obtaining VPN credentials, so hackers could escalate access to more secure areas
of a victim's infrastructure, or use the VPN accounts as more stable backdoors.

Fox-IT said that despite what appears to be a very prodigious hacking activity
over the past two years, "overall the actor has been able to stay under the
radar."



They did so, researchers explain, by using legitimate tools that were already
installed on hacked devices, rather than downloading their own custom-built
malware, which could have been detected by local security software.




APT20 SEEN BYPASSING 2FA

But this wasn't the thing that stood out the most in all the attacks the Dutch
security firm investigated. Fox-IT analysts said they found evidence the hackers
connected to VPN accounts protected by 2FA.

How they did it remains unclear; although, the Fox-IT team has their theory.
They said APT20 stole an RSA SecurID software token from a hacked system, which
the Chinese actor then used on its computers to generate valid one-time codes
and bypass 2FA at will.

Normally, this wouldn't be possible. To use one of these software tokens, the
user would need to connect a physical (hardware) device to their computer. The
device and the software token would then generate a valid 2FA code. If the
device was missing, the RSA SecureID software would generate an error.




Image: Fox-IT

The Fox-IT team explains how hackers might have gone around this issue:

The software token is generated for a specific system, but of course this system
specific value could easily be retrieved by the actor when having access to the
system of the victim.

As it turns out, the actor does not actually need to go through the trouble of
obtaining the victim's system specific value, because this specific value is
only checked when importing the SecurID Token Seed, and has no relation to the
seed used to generate actual 2-factor tokens. This means the actor can actually
simply patch the check which verifies if the imported soft token was generated
for this system, and does not need to bother with stealing the system specific
value at all.




In short, all the actor has to do to make use of the 2 factor authentication
codes is to steal an RSA SecurID Software Token and to patch 1 instruction,
which results in the generation of valid tokens.



Image: Fox-IT


WOCAO

Fox-IT said it was able to investigate APT20's attacks because they were called
in by one of the hacked companies to help investigate and respond to the hacks.

More on these attacks can be found in a report named "Operation Wocao."

The Dutch company said it named the report "Wocao" after a response the Chinese
hackers had after they've been detected and booted out of a victim's network.

In the screenshot below, you can view APT20 trying to connect to a (now-removed)
web shell they installed on a victim's network.

The hackers try running several Windows commands. When the commands fail to
execute, APT20 hackers understand they've been detected and thrown out of the
network, and they type one last command in frustration -- wocao, which is the
Chinese slang for "shit" or "damn."



Image: Fox-IT

THE WORLD'S MOST FAMOUS AND DANGEROUS APT (STATE-DEVELOPED) MALWARE

◀



SECURITY

 * How to find and remove spyware from your phone
 * The best VPN services: How do the top 5 compare?
 * How to find out if you are involved in a data breach -- and what to do next
 * The 5 best browsers for privacy: Secure web browsing
 * How to delete yourself from search results and hide your identity online

Editorial standards
Show Comments
Log In to Comment Community Guidelines





RELATED

FBI warning: This ransomware group is targeting poorly protected VPN servers



FBI WARNING: THIS RANSOMWARE GROUP IS TARGETING POORLY PROTECTED VPN SERVERS

Waterproof your device when taking a dunk with these top phone pouches



WATERPROOF YOUR DEVICE WHEN TAKING A DUNK WITH THESE TOP PHONE POUCHES

The best Mac deals right now: Save $400 on the M1 MacBook Pro



THE BEST MAC DEALS RIGHT NOW: SAVE $400 ON THE M1 MACBOOK PRO









ZDNET
we equip you to harness the power of disruptive innovation, at work and at home.
 * Topics
 * Galleries
 * Videos
 * Do Not Sell or Share My Personal Information

 * about ZDNET
 * Meet The Team
 * Site Map
 * Reprint Policy

 * Join | Log In
 * Newsletters
 * Site Assistance

 * 
 * 
 * 
 * 

© 2022 ZDNET, A Red Ventures company. All rights reserved. Privacy Policy |
Cookie Settings | Advertise | Terms of Use
Cookie Settings

We use cookies and similar technologies to understand how you use our services,
improve your experience and serve you personalized content and advertising. By
clicking "Accept All", you accept all cookies. By clicking "Reject All", you
reject all cookies except Strictly Necessary cookies. To manage your cookies and
learn more about our use of cookies click “Cookie Settings”.Learn more.

Cookie Settings Reject All Accept All