www.trendmicro.com Open in urlscan Pro
2.16.97.53  Public Scan

URL: https://www.trendmicro.com/de_de/research/24/k/lodeinfo-campaign-of-earth-kasha.html
Submission: On November 21 via api from IN — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="main-menu-search" aria-label="Search Trend Micro">
  <div class="main-menu-search__field-wrapper" id="cludo-search-form">
    <table class="gsc-search-box">
      <tbody>
        <tr>
          <td class="gsc-input">
            <input type="text" class="gsc-input-field" name="search" title="search" placeholder="Search" autocomplete="off" aria-label="search">
          </td>
        </tr>
      </tbody>
    </table>
  </div>
</form>

Text Content

Unternehmen

search close

 * Lösungen
   * Nach Aufgabe
       
     * Nach Aufgabe
         
       * Nach Aufgabe
         Mehr erfahren
         
     * NIS2-Richtlinie
         
       * NIS2-Richtlinie
         Mehr erfahren
         
     * Risiken verstehen, priorisieren und eindämmen
         
       * Risiken verstehen, priorisieren und eindämmen
         
         Minimieren Sie Risiken durch Angriffsflächenmanagement.
         
         Mehr erfahren
         
     * Schutz für Cloud-native Anwendungen
         
       * Schutz für Cloud-native Anwendungen
         
         Genießen Sie Sicherheit, die positive Geschäftsergebnisse ermöglicht.
         
         Mehr erfahren
         
     * Schutz für Ihre Hybrid Cloud
         
       * Schützen Sie Ihre Hybrid- und Multi-Cloud-Welt
         
         Gewinnen Sie Transparenz und erfüllen Sie Geschäftsanforderungen in
         puncto Sicherheit.
         
         Mehr erfahren
         
     * Schutz Ihrer verteilten Belegschaft
         
       * Schutz Ihrer verteilten Belegschaft
         
         Ermöglichen Sie überall und auf jedem Gerät sichere Verbindungen.
         
         Mehr erfahren
         
     * Beseitigen Sie blinde Flecken im Netzwerk
         
       * Beseitigen Sie blinde Flecken im Netzwerk
         
         Schützen Sie Anwender und wichtige Abläufe in Ihrer gesamten Umgebung.
         
         Mehr erfahren
         
     * Mehr sehen. Schneller reagieren.
         
       * Mehr sehen. Schneller reagieren.
         
         Bleiben Sie der Konkurrenz einen Schritt voraus – mit leistungsstarken,
         speziell entwickelten XDR-Funktionen, Angriffsflächenmanagement und
         Zero-Trust-Funktionen
         
         Weitere Informationen
         
     * Erweitern Sie Ihr Team
         
       * Erweitern Sie Ihr Team. Reagieren Sie agil auf Bedrohungen.
         
         Maximieren Sie Ihre Effektivität mit proaktiver Risikoeindämmung und
         Managed Services.
         
         Weitere Informationen
         
     * Operationalisierung von Zero-Trust-Funktionen –
         
       * Operationalisierung von Zero-Trust-Funktionen –
         
         Verstehen Sie Ihre Angriffsfläche und bewerten Sie Ihr Risiko in
         Echtzeit. Passen Sie Richtlinien für das gesamte Netzwerk, alle
         Arbeitslasten und Geräte von einer einzigen Konsole aus an.
         
         Mehr erfahren
         
   * Nach Rolle
       
     * Nach Rolle
         
       * Nach Rolle
         Mehr erfahren
         
     * CISO
         
       * CISO
         
         Steigern Sie Ihren Geschäftswert durch messbare Ergebnisse zur
         Cybersicherheit.
         
         Mehr erfahren
         
     * SOC-Manager
         
       * SOC-Manager
         
         Mehr erkennen, schneller reagieren
         
         Mehr erfahren
         
     * Infrastrukturmanager
         
       * Infrastrukturmanager
         
         Entwickeln Sie Ihr Sicherheitskonzept weiter, um Bedrohungen schnell
         und effektiv zu erkennen.
         
         Mehr erfahren
         
     * Cloud-Entwickler
         
       * Cloud-Entwickler
         
         Stellen Sie sicher, dass Code nur erwartungsgemäß ausgeführt wird.
         
         Mehr erfahren
         
     * Cloud-SecOps
         
       * Cloud-SecOps
         
         Gewinnen Sie mehr Transparenz und Kontrolle mit Sicherheitslösungen,
         die speziell für Cloud-Umgebungen entwickelt wurden.
         
         Mehr erfahren
         
   * Nach Branche
       
     * Nach Branche
         
       * Nach Branche
         Mehr erfahren
         
     * Gesundheitswesen
         
       * Gesundheitswesen
         
         Schutz von Patientendaten, Geräten und Netzwerken bei gleichzeitiger
         Einhaltung der Vorschriften
         
         Weitere Informationen
         
     * Fertigung
         
       * Fertigung
         
         Schutz von Produktionsumgebungen – von traditionellen Geräten bis hin
         zu hochmodernen Infrastrukturen
         
         Weitere Informationen
         
     * Öl und Gas
         
       * Öl und Gas
         
         ICS-/OT-Sicherheit für Versorgungsbetriebe in der Öl- und Gasbranche
         
         Mehr erfahren
         
     * Stromerzeugung
         
       * Stromerzeugung
         
         ICS-/OT-Sicherheit für Stromerzeugungsbetriebe
         
         Mehr erfahren
         
     * Automobilbranche
         
       * Automobilbranche
         Mehr erfahren
         
     * 5G-Netze
         
       * 5G-Netze
         Mehr erfahren
         
     * Öffentlicher Sektor & Gesundheitswesen
         
       * Öffentlicher Sektor & Gesundheitswesen
         Weitere Informationen
         
   * Sicherheit für kleine und mittelständische Unternehmen
       
     * Sicherheit für kleine und mittelständische Unternehmen
       
       Stoppen Sie Bedrohungen mit benutzerfreundlichen Lösungen, die für Ihr
       wachsendes Unternehmen entwickelt wurden
       
       Weitere Informationen
       
   * NIS2 & ISG & LSI
       
     * NIS2-Richtlinie
         
       * NIS2-Richtlinie
         Mehr erfahren
         
     * ISG – Informationssicherheitsgesetz
         
       * ISG – Informationssicherheitsgesetz
         Mehr erfahren
         
     * LSI - Loi sur la Sécurité de l'Information
         
       * LSI - Loi sur la Sécurité de l'Information
         Mehr erfahren
         
 * Plattform
   * Vision One Plattform
       
     * Vision One Plattform
         
       * Trend Vision One
         Einheitliche Plattform
         
         Verbindet den Schutz vor Bedrohungen und das Management des
         Cyberrisikos
         
         Weitere Informationen
         
     * Companion-KI
         
       * Trend Vision One Companion
         
         Ihr Cybersicherheitsassistent mit generativer KI
         
         Weitere Informationen
         
   * Endpunktsicherheit
       
     * Endpunktsicherheit
         
       * Endpunktsicherheit – Übersicht
         
         Schützen Sie Ihre Endpunkte in jeder Phase eines Angriffs
         
         Weitere Informationen
         
     * Industrial Endpoint Security
         
       * Industrial Endpoint Security
         Mehr erfahren
         
     * Workload Security
         
       * Workload Security
         
         Optimierte Prävention, Erkennung und Reaktion für Endpunkte, Server und
         Cloud-Workloads
         
         Weitere Informationen
         
     * Mobile Security
         
       * Mobile Security
         
         Schützen Sie sich gegen Malware, schädliche Anwendungen und andere
         mobile Bedrohungen, on Premises und in der Cloud.
         
         Weitere Informationen
         
     * XDR for Endpoint
         
       * XDR for Endpoint
         
         Stoppen Sie Angriffe schneller. Nutzen Sie eine breitere Perspektive
         und besseren Kontext, um Bedrohungen auf einer einzigen Plattform zu
         jagen, zu entdecken, zu untersuchen und auf sie zu reagieren.
         
         Weitere Informationen
         
   * Cloud Security
       
     * Cloud Security
         
       * Trend Vision One™
         Cloud-Sicherheit – Übersicht
         
         Bauen Sie auf die bewährte Cloud-Sicherheitsplattform für Entwickler,
         Sicherheitsteams und Unternehmen.
         
         Weitere Informationen
         
     * Workload Security
         
       * Workload Security
         
         Schützen Sie Ihr Rechenzentrum, die Cloud und Container ohne
         Leistungseinbußen – nutzen Sie eine Cloud-Sicherheitsplattform mit
         CNAPP-Funktionen
         
         Mehr erfahren
         
     * Container Security
         
       * Container-Sicherheit
         
         Vereinfachen Sie die Sicherheit für Ihre Cloud-nativen Anwendungen
         durch erweitertes Container-Image-Scanning, richtlinienbasierte
         Zugriffssteuerung und Container-Laufzeitschutz.
         
         Mehr erfahren
         
     * File Security
         
       * File Security
         
         Schützen Sie Anwendungsworkflows und Cloud-Speicher vor neuen und
         komplexen Bedrohungen
         
         Mehr erfahren
         
     * Angriffsflächen-Risikomanagement für die Cloud
         
       * Angriffsflächen-Risikomanagement für die Cloud
         
         Erkennung von Cloud-Assets, Priorisieren von Schwachstellen, Management
         des Cloud-Sicherheitsstatus und Angriffsflächenmanagement – alles in
         einem
         
         Weitere Informationen
         
     * XDR für die Cloud
         
       * XDR für die Cloud
         
         Erweiterung der Transparenz auf die Cloud und Optimierung von
         SOC-Untersuchungen
         
         Weitere Informationen
         
   * Netzwerksicherheit
       
     * Netzwerksicherheit
         
       * Network Security – Übersicht
         
         Erweitern Sie die Leistungsfähigkeit von XDR durch Network Detection
         and Response (NDR).
         
         Mehr erfahren
         
     * Network Intrusion Prevention (IPS)
         
       * Network Intrusion Prevention (IPS)
         
         Schutz vor bekannten, unbekannten und noch nicht offengelegten
         Sicherheitslücken in Ihrem Netzwerk
         
         Mehr erfahren
         
     * Breach Detection System (BDS)
         
       * Breach Detection System (BDS)
         
         Erkennen Sie gezielte Angriffe im eingehenden, ausgehenden und
         lateralen Datenverkehr und reagieren Sie darauf.
         
         Mehr erfahren
         
     * Secure Service Edge (SSE)
         
       * Secure Service Edge (SSE)
         
         Definieren Sie Vertrauen neu und sorgen Sie durch kontinuierliche
         Risikobewertungen für eine sichere digitale Transformation.
         
         Mehr erfahren
         
     * Industrial Network Security
         
       * Industrial Network Security
         Mehr erfahren
         
     * XDR für Netzwerke
         
       * XDR für Netzwerke
         
         Stoppen Sie Angriffe schneller. Nutzen Sie eine breitere Perspektive
         und besseren Kontext, um Bedrohungen auf einer einzigen Plattform zu
         jagen, zu entdecken, zu untersuchen und auf sie zu reagieren.
         
         Weitere Informationen
         
     * 5G-Netzwerksicherheit
         
       * 5G-Netzwerksicherheit
         Weitere Informationen
         
   * End-of-Support-Plattformen und -Betriebssysteme
       
     * End-of-Support-Plattformen und -Betriebssysteme
       Mehr erfahren
       
   * Alle Produkte, Services und Testversionen
       
     * Alle Produkte, Services und Testversionen
       Weitere Informationen
       
   * Angriffsflächenmanagement
       
     * Angriffsflächenmanagement
       
       Datenlecks frühzeitig verhindern
       
       Weitere Informationen
       
   * E-Mail-Sicherheit
       
     * E-Mail-Sicherheit
         
       * E-Mail-Sicherheit
         
         Stoppen Sie die Infiltration Ihres Unternehmens durch Phishing,
         Malware, Ransomware, Betrug und gezielte Angriffe
         
         Weitere Informationen
         
     * Schutz für E-Mail und Kollaboration
         
       * Trend Vision One™
         Schutz für E-Mail und Kollaboration
         
         Stoppen Sie Phishing, Ransomware und gezielte Angriffe auf jeden
         E-Mail-Service, einschließlich Microsoft 365 und Google Workspace
         
         Weitere Informationen
         
   * XDR (Extended Detection and Response)
       
     * XDR (Extended Detection and Response)
       
       Stoppen Sie Angriffe schneller. Nutzen Sie eine breitere Perspektive und
       besseren Kontext, um Bedrohungen auf einer einzigen Plattform zu jagen,
       zu entdecken, zu untersuchen und auf sie zu reagieren.
       
       Mehr erfahren
       
   * Threat Insights
       
     * Einblicke in Bedrohungen
       
       Erkennen Sie Bedrohungen schon von Weitem
       
       Weitere Informationen
       
   * OT-Sicherheit
       
     * OT-Sicherheit
         
       * OT-Sicherheit
         
         Lernen Sie Lösungen für ICS-/OT-Sicherheit kennen.
         
         Weitere Informationen
         
     * Industrial Endpoint Security
         
       * Industrial Endpoint Security
         Weitere Informationen
         
     * Industrial Network Security
         
       * Industrial Network Security
         Industrial Network Security
         
     * XDR für OT
         
       * XDR für OT
         
         Stoppen Sie Angriffe schneller. Nutzen Sie eine breitere Perspektive
         und besseren Kontext, um Bedrohungen auf einer einzigen Plattform zu
         jagen, zu entdecken, zu untersuchen und auf sie zu reagieren.
         
         Weitere Informationen
         
   * Identity Security
       
     * Identity Security
       
       Durchgängige Identity Security vom Identity Posture Management bis zu
       Detection and Reponse
       
       Mehr erfahren
       
   * On-Premises Data Sovereignty
       
     * Lokale Datenhoheit
       
       Verhinderung, Erkennung, Reaktion und Schutz ohne Kompromisse bei der
       Datenhoheit
       
       Mehr erfahren
       
 * Informationen
   * Informationen
       
     * Informationen
         
       * Informationen
         Mehr erfahren
         
     * Research, Neuigkeiten und Perspektiven
         
       * Research, Neuigkeiten und Perspektiven
         Mehr erfahren
         
     * Research und Analyse
         
       * Research und Analyse
         Mehr erfahren
         
     * IT Security Best Practices
         
       * IT Security Best Practices
         Mehr erfahren
         
     * Nachrichten zum Thema Sicherheit
         
       * Nachrichten zum Thema Sicherheit
         Mehr erfahren
         
     * Zero-Day-Initiative (ZDI)
         
       * Zero-Day-Initiative (ZDI)
         Mehr erfahren
         
 * Services
   * Trend Micro Services
       
     * Trend Micro Services
         
       * Trend Micro Services
         Mehr erfahren
         
     * Servicepakete
         
       * Servicepakete
         
         Verstärken Sie Ihre Sicherheitsteams: Rund-um-die-Uhr-Service für
         Managed Detection, Response und Support.
         
         Mehr erfahren
         
     * Managed XDR
         
       * Managed XDR
         
         Ergänzen Sie Ihr Team mit einem von Experten gemanagten Service für
         Erkennung und Reaktion (Managed Detection and Response, MDR) für
         E-Mails, Endpunkte, Server, Cloud-Workloads und Netzwerke.
         
         Mehr erfahren
         
     * Support Services
         
       * Support Services
         Mehr erfahren
         
     * Reaktionen auf Vorfälle
         
       * Reaktionen auf Vorfälle
           
         * Reaktionen auf Vorfälle
           
           Vertrauenswürdige Fachleute helfen Ihnen jederzeit gerne, egal ob Sie
           von einem Sicherheitsvorfall betroffen sind oder Ihre IR-Pläne
           proaktiv verbessern möchten.
           
           Weitere Informationen
           
       * Versicherungsanbieter und Anwaltskanzleien
           
         * Versicherungsanbieter und Anwaltskanzleien
           
           Vermeiden Sie Sicherheitsverletzungen mit einer erstklassigen Lösung
           zur Erkennung und Reaktion und reduzieren Sie die Kosten Ihrer Kunden
           für Ausfallzeiten und Schadensfälle.
           
           Mehr erfahren
           
 * Partner
   * Alliance Partner
       
     * Alliance Partner
         
       * Alliance Partner
         
         Trend arbeitet mit den Besten zusammen, um sie dabei zu begleiten, ihre
         Leistung und ihren Wert zu optimieren
         
         Weitere Informationen
         
     * Technology Alliance Partner
         
       * Technology Alliance Partner
         Mehr erfahren
         
     * Alliance Partner suchen
         
       * Alliance Partner suchen
         Weitere Informationen
         
   * Partner suchen
       
     * Partner suchen
       
       Finden Sie einen örtlichen Partner, bei dem Sie Lösungen von Trend Micro
       kaufen können.
       
       Weitere Informationen
       
   * Partnerprogramm
       
     * Partnerprogramm
         
       * Partnerprogramm Übersicht
         
         Bauen Sie Ihr Business aus und schützen Sie Ihre Kunden – durch
         umfassende, mehrschichtige Sicherheit für höchste Ansprüche
         
         Weitere Informationen
         
     * Kompetenzen der Partner
         
       * Kompetenzen der Partner
         
         Heben Sie sich vom Mitbewerb ab, indem Sie Ihre Kompetenz mit
         entsprechenden Nachweisen belegen
         
         Weitere Informationen
         
     * Managed Security Service Provider
         
       * Managed Security Service Provider
         
         Bereitstellung moderner Sicherheitsdienstleistungen mit
         branchenführendem XDR
         
         Weitere Informationen
         
     * Managed Service Provider
         
       * Managed Service Provider
         
         Arbeiten Sie mit einem führenden Experten für Cybersicherheit zusammen
         und nutzen Sie bewährte Lösungen speziell für MSPs.
         
         Weitere Informationen
         
     * Erfolge von Partnern
         
       * Erfolge von Partnern
         Weitere Informationen
         
   * Partnerressourcen
       
     * Partnerressourcen
         
       * Partnerressourcen
         
         Entdecken Sie Ressourcen, die das Wachstum Ihres Geschäfts ankurbeln
         und Ihre Möglichkeiten als Partner von Trend Micro verbessern
         
         Weitere Informationen
         
     * Partner werden
         
       * Partner werden
         Weitere Informationen
         
     * Trend Campus
         
       * Trend Campus
         
         Lernen Sie schneller mit Trend Campus, der benutzerfreundlichen
         Bildungsplattform, die personalisierte technische Unterstützung bietet
         
         Weitere Informationen
         
     * Co-Selling
         
       * Co-Selling
         
         Greifen Sie auf kollaborative Services zu, die Ihnen helfen, den Wert
         von Trend Vision One™ zu demonstrieren und Ihr Business auszubauen
         
         Weitere Informationen
         
     * Distributoren
         
       * Distributoren
         Weitere Informationen
         
     * Partnerportal-Anmeldung
         
       * Partnerportal-Anmeldung
         Anmelden
         
 * Unternehmen
   * Warum Trend Micro?
       
     * Warum Trend Micro?
         
       * Warum Trend Micro?
         Weitere Informationen
         
     * C5-Testat
         
       * C5-Testat
         Weitere Informationen
         
     * Kundenreferenzen
         
       * Kundenreferenzen
         Mehr erfahren
         
     * Branchenauszeichnungen
         
       * Branchenauszeichnungen
         Mehr erfahren
         
     * Strategische Partnerschaften
         
       * Strategische Partnerschaften
         Mehr erfahren
         
   * Trend Micro vergleichen
       
     * Trend Micro vergleichen
         
       * Trend Micro vergleichen
         
         So überflügelt Trend seine Mitbewerber
         
         Los geht’s
         
     * mit CrowdStrike
         
       * Trend Micro versus CrowdStrike
         
         CrowdStrike bietet mit seiner Cloud-nativen Plattform effektive
         Cybersicherheit. Die Preise könnten jedoch zu hoch sein, vor allem für
         Unternehmen, die eine kosteneffiziente Skalierbarkeit über eine einzige
         Plattform anstreben.
         
         Los geht’s
         
     * mit Microsoft
         
       * Trend Micro versus Microsoft
         
         Microsoft bietet einen grundlegenden Schutz, benötigt jedoch oft
         zusätzliche Lösungen, um die Sicherheitsprobleme der Kunden vollständig
         zu lösen.
         
         Los geht’s
         
     * mit Palo Alto Networks
         
       * Trend Micro versus Palo Alto Networks
         
         Palo Alto Networks bietet fortschrittliche Cybersicherheitslösungen.
         Die Navigation in der umfangreichen Suite kann jedoch komplex sein, und
         die Freischaltung aller Funktionen erfordert erhebliche Investitionen.
         
         Los geht’s
         
   * Info
       
     * Info
         
       * Info
         Mehr erfahren
         
     * Impressum
         
       * Impressum
         Mehr erfahren
         
     * Trust Center
         
       * Trust Center
         Mehr erfahren
         
     * Geschichte
         
       * Geschichte
         Mehr erfahren
         
     * Diversität, Fairness und Inklusion
         
       * Diversität, Fairness und Inklusion
         Mehr erfahren
         
     * Soziale Unternehmensverantwortung
         
       * Soziale Unternehmensverantwortung
         Mehr erfahren
         
     * Management
         
       * Management
         Mehr erfahren
         
     * Sicherheitsexperten
         
       * Sicherheitsexperten
         Mehr erfahren
         
     * Weiterbildungsangebote in den Bereichen Internetsicherheit und
       Cybersicherheit
         
       * Weiterbildungsangebote in den Bereichen Internetsicherheit und
         Cybersicherheit
         Mehr erfahren
         
     * Rechtliche Hinweise
         
       * Rechtliche Hinweise
         Mehr erfahren
         
     * Formel-E-Rennen
         
       * Formel-E-Rennen
         Weitere Informationen
         
   * Kontakt aufnehmen
       
     * Kontakt aufnehmen
         
       * Kontakt aufnehmen
         Mehr erfahren
         
     * Newsroom
         
       * Newsroom
         Mehr erfahren
         
     * Veranstaltungen
         
       * Veranstaltungen
         Mehr erfahren
         
     * Karriere
         
       * Karriere
         Mehr erfahren
         
     * Webinare
         
       * Webinare
         Mehr erfahren
         

Back

Back

Back

Back

 * Kostenlose Testversionen
 * Kontakt

Sie suchen nach Lösungen für zu Hause?
Sie werden angegriffen?
0 Warnungen

Back
Ungelesen
Alles

Folio (0)
Support
 * Support-Portal für Unternehmen
 * Weiterbildung und Zertifizierung
 * Kontakt mit dem Support
 * Supportpartner finden

Ressourcen
 * KI-Sicherheit
 * Trend Micro versus Mitbewerb
 * Cyber Risk Index/Assessment
 * Was ist ...?
 * Enzyklopädie der Bedrohungen
 * Cyber-Versicherung
 * Glossar der Begriffe
 * Webinare

Anmelden
 * Vision One
 * Support
 * Partnerportal
 * Cloud One
 * Produktaktivierung und -management
 * Referenzpartner

Back

arrow_back
search



close

Content has been added to your Folio

Go to Folio (0) close

APT und gezielte Angriffe


SPOT THE DIFFERENCE: EARTH KASHA'S NEW LODEINFO CAMPAIGN AND THE CORRELATION
ANALYSIS WITH THE APT10 UMBRELLA

LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend
Micro has been tracking the group as Earth Kasha. We have identified a new
campaign connected to this group with significant updates to their strategy,
tactics, and arsenals.

By: Hara Hiroaki November 19, 2024 Read time: 19 min (5210 words)

Save to Folio

Subscribe

--------------------------------------------------------------------------------

This blog is based on a presentation by the authors at Virus Bulletin 2024.


INTRODUCTION

LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend
Micro has been tracking the group as Earth Kasha. While some vendors suspect
that the actor using LODEINFO might be APT10, we don’t have enough evidence to
fully support this speculation. Currently, we view APT10 and Earth Kasha as
different entities, although they might be related. To avoid confusion caused by
names, we use a new term “APT10 Umbrella," which represents a group of intrusion
sets related to APT10 (including APT10 itself).

Earth Kasha has been known to have targeted public institutions and academics
with spear-phishing emails since their emergence. From early 2023 to early 2024,
however, we identified a new campaign with significant updates to their
strategy, tactics, and arsenals.

Figure 1. An overview of relationships of Earth Kasha
download

LODEINFO Since 2023

In the new campaign starting in early 2023, Earth Kasha expanded their targets
into Japan, Taiwan, and India. Based on the bias of the incident amount, while
we believe that Japan is still the main target of Earth Kasha, we observed that
a few high-profile organizations in Taiwan and India were targeted. The observed
industries under attack are organizations related to advanced technology and
government agencies.

Earth Kasha has also employed different Tactics, Techniques, and Procedures
(TTPs) in the Initial Access phase, which now exploits public-facing
applications such as SSL-VPN and file storage services. We observed that
vulnerabilities of enterprise products, such as Array AG (CVE-2023-28461),
Proself (CVE-2023-45727) and FortiOS/FortiProxy (CVE-2023-27997), were abused in
the wild. Earth Kasha was changing these vulnerabilities to abuse from time to
time. After gaining access, they deployed several backdoors in the victim's
network to achieve persistence. These include Cobalt Strike, LODEINFO, and the
newly discovered NOOPDOOR, which we will describe later.


OBSERVED TTPS IN POST-EXPLOITATION

Our comprehensive analysis of the activities in the Post-Exploitation phase has
revealed that the primary motivation behind the attack was the theft of the
victim’s information and data. Earth Kasha first discovered Active Directory
configuration and domain user information to achieve this goal using legitimate
Microsoft tools, such as csvde.exe, nltest.exe and quser.exe. The following are
actual commands used by the adversary.

 * csvde.exe  -f all.csv –u
 * nltest.exe  /domain_trusts
 *  quser.exe 

They then accessed the file server and tried to find documents related to the
system information of the customer's network by simply using "dir" commands
recursively. Interestingly, upon checking on their activity, the operator might
check the content of the documents manually. The stolen information may help the
adversary find the next valuable target.

Earth Kasha then performs several techniques to acquire credentials. One method
uses their custom malware, MirrorStealer, to dump stored credentials in
applications. MirrorStealer (originally reported by ESET) is a credential dumper
targeting multiple applications such as browsers (Chrome, Firefox, Edge and
Internet Explorer), email clients (Outlook, Thunderbird, Becky, and Live Mail),
Group Policy Preferences and SQL Server Management Studio.

Since MirrorStealer may be designed to dump credentials on client machines,
Earth Kasha used another way to dump OS credentials. We observed that the
adversary abused vssadmin to copy registry hives and ntds.dit in the Active
Directory server from volume shadow copy. The SAM registry hive contains the
NTLM hash of local machine users, while ntds.dit contains the NTLM hash of all
the domain users. The following are commands the adversary uses after creating a
volume shadow copy.

 * copy  \\<AD_SERVER_IP>\c$\windows\temp\ntds.dit .
 * copy  \\<AD_SERVER_IP>\c$\windows\temp\system .
 * copy  \\<AD_SERVER_IP>\c$\windows\temp\sam .

While we couldn’t figure out the actual method they abused, we have observed
that Earth Kasha successfully compromised domain admin in most cases. After
compromising domain admin, they deployed backdoors (LODEINFO or NOOPDOOR) to
several machines by copying components over SMB and abusing schetasks.exe or
sc.exe to achieve lateral movement. The following are the adversary's actual
commands to deploy malicious components over admin shares.

 * copy SfsDllSample.exe \\<IP>\c$\windows\temp\SfsDllSample.exe 
 * copy SfsDll32.dll     \\<IP>\c$\windows\temp\SfsDll32.dll
 * copy mssitlb.xml  \\<IP>\C$\Windows\system32\UIAnimation.xml
 * copy ShiftJIS.dat
   \\<IP>\C$\Windows\system32\ComputerToastIcon.contrast-white.dat

Once the intrusion progressed, Earth Kasha started to exfiltrate the stolen
information. The adversary gathered data, including ntds.dit, SYSTEM, SAM
registry hives and other interesting files on a single victim machine and
compressed these files into a single archive using the makecab command. While we
couldn’t confirm how these data would be exfiltrated, it might be over the
backdoor channel. Earth Kasha also exfiltrated interesting files in the victim
network over the RDP session. They copied interesting files to the RDP source
host over SMB (“tsclient” is an RDP source host).

 * \\tsclient\C\aaa\All PC List.xlsx
 * \\tsclient\C\aaa\All IP List.xlsx
 * \\tsclient\C\aaa\Network Diagram.xlsx


MALWARE ANALYSIS

In the previous campaign by Earth Kasha, LODEINFO has been their primary
backdoor of choice. In the new campaign, however, we have observed several
backdoors, such as Cobalt Strike, LODEINFO and previously undocumented NOOPDOOR.
These backdoors were selectively used for each incident.

Figure 2. Observed malware in each incident
download

Possible Cracked Version of Cobalt Strike

In the early incidents above, Earth Kasha also used Cobalt Strike. Like other
adversaries, Cobalt Strike is designed to be executed only in memory. In this
case, Earth Kasha used a shellcode loader written in Go, which we dubbed
GOSICLOADER. GOSICLOADER is intended to be loaded via DLL side-loading and
simply decrypts the embedded payload in the data section using Based64+AES.

Figure 3. Execution flow of GOSICLOADER
download

Upon checking the configuration of the Cobalt Strike beacon, we noticed it could
be a cracked version of the Cobalt Strike, known as CSAgent, shared among the
Chinese-speaking hacking community. According to the developer of Cobalt Strike,
Cobalt Strike beacon embeds watermark and watermark hash to make it difficult to
tamper with authorization. CSAgent modifies the watermark to include "666666" by
default and uses a watermark hash that matches the one embedded in the observed
Cobalt Strike beacon for this campaign. Since the watermark and its hash can be
easily tampered with if the adversary knows the algorithm, this modification
could be a false flag, but it is still noteworthy.

Figure 4. Watermark and watermark hash in configuration
download
Figure 5. Watermark and its hash in CSAgent
download

LODEINFO

LODEINFO is a backdoor exclusively used by Earth Kasha since 2019, serving as
their primary backdoor. In this new campaign, however, it is just one option
among several, showing its adaptability. Since its introduction, LODEINFO has
gone through continuous updates, as indicated by its version numbers. In this
campaign, we have observed versions v0.6.9, v0.7.1, v0.7.2, and v0.7.3

Figure 6. Version number history of LODEINFO
download

With the incrementing version number, Earth Kasha has also been updating a
procedure to execute LODEINFO. In this new campaign, they deployed three
components in the victim machine. They registered the legitimate application
(SfsDllSample.exe in Figure 7) as a scheduled task, which will trigger DLL
Side-Loading of malicious DLL (SfsDll32.dll in Figure 7).

Figure 7. Execution sequence of LODEINFO
download

This malicious DLL, which we dubbed LODEINFOLDR (aka FaceLoader by ESET),
extracts an encrypted payload embedded in the digital signature of the loaded
process and decrypts it by RC4 or XOR. The encrypted payload is embedded in the
legitimate digital signature by abusing MS13-098/CVE-2013-3900.

Figure 8. Embedded encrypted payload and RC4 in digital signature
download

We distinguish this LODEINFOLDR in the new campaign from the ones we had seen in
the previous campaign, and we call this new loader LODEINFOLDR Type 2. At first
glance, we thought LODEINFOLDR Type 2 was their new loader developed for the new
campaign. Still, after further investigation, we identified that LODEINFOLDR
Type 2 looks the same as the loader of LODEINFO used in the LiberalFace campaign
in 2022, disclosed by ESET3. This may infer that the same entity has used the
same malware since the previous campaign.

Regarding LODEINFO, several backdoor commands were newly supported. “pkill”,
“ps”, “keylog”, and “autorun” were added in v0.6.9, and “runas” was newly added
in v0.7.1. The backdoor commands supported in v0.6.9 differed from the old ones
since these commands were initially added in the previous version, removed in
v0.6.3 and added again in v0.6.9. On the other hand, “runas” supported in v0.7.1
is a new one that enables running the processes as a specific user. Since
v0.7.2, the "config" command, which is just used to display “Not Available.”,
has been fully implemented.

v0.6.9 v0.7.1 v0.7.2 and v0.7.3 command
ls
rm
mv
cp
cat
mkdir
send
recv
memory
kill
cd
ver
print
ransom (not implemented)
comc
config
pkill
ps
keylog
autorun command
ls
rm
mv
cp
cat
mkdir
send
recv
memory
kill
cd
ver
print
ransom (not implemented)
comc
config
pkill
ps
keylog
autorun
runas command
ls
rm
mv
cp
cat
mkdir
send
recv
memory
kill
cd
ver
print
ransom (not implemented)
comc
config
pkill
ps
keylog
autorun
runas

Table 1. Backdoor commands supported by LODEINFO, newly added commands in
italics

All the LODEINFO we observed in the new campaign were slightly different in the
backdoor command process compared to the LODEINFO in the previous campaign. This
LODEINFO type supports running DLL or shellcode in memory without backdoor
command processing. After further investigation, we concluded that this type of
LODEINF we observed in the new campaign should be the same as the one that ESET
calls “The 2nd stage LODEINFO” observed in the LiberalFace campaign. As Figure 9
and Figure 10 show, the LODEINFO in the new campaign directly supports running
DLL or shellcode in memory without processing backdoor commands. This evidence
may also infer that the same group has been using the same malware since the
previous campaign.

Figure 9. C&C server response processing of the LODEINFO in the previous
campaign
download
Figure 10. C&C server response processing of the 2nd stage LODEINFO
download

NOOPLDR

During our investigation, we encountered two different shellcode loaders; one is
XML containing C#, and the other is DLL. These two types of shellcode loaders
are completely different in the implementation perspective. However, a payload
of both is a previously undocumented backdoor that we call NOOPDOOR, which we
will describe later. Both loaders adopt a similar strategy to decrypt and store
the encrypted payload using the machine's device ID. Based on these
similarities, we categorized both as the same variant, which we dubbed NOOPLDR.
We distinguish the former XML/C# one as “NOOPLDR Type 1” and DLL one as “NOOPLDR
Type 2," respectively. NOOPLDR Type 1 is designed to be executed by Windows'
trusted utility tool, MSBuild, as shown in Figure 11.

Figure 11. Execution flow of NOOPLDR Type 1 (XML)
download

In most cases, MSBuild and the target XML file are registered as a Scheduled
Task for persistence. MSBuild compiles the inclined C# in XML project on
runtime, a key component of NOOPLDR Type 1. The inclined C# code is typically
concealed as follows. 

Figure 12. Example of NOOPLDR
download

NOOPLDR Type 1 changes its behavior depending on whether it’s the first-time
execution or otherwise. If it’s the first execution, NOOPLDR Type 1 tries to
find encrypted data from a hardcoded file path, which differs for each NOOPLDR
sample. If it exists, NOOPLDR Type 1 deletes the file after reading the content.
The encrypted data consists of a header for checksum, AES key materials and an
encrypted body. NOOPLDR Type 1 reads the first 32 bytes, computes the SHA256
hash of the following encrypted body, and then compares the hash with the header
to verify if the data is an expected structure. After completing verification,
NOOPLDR Type 1 calculates the SHA384 hash of the AES key material following
behind the checksum header. The first 32 bytes are used as the AES key, and the
later 16 as IV. Finally, NOOPLDR Type 1 decrypts the encrypted payload by
AES256-CBC.

Figure 13. Structure of the encrypted data of NOOPLDR Type 1
download

The decrypted data has a header containing a 64-bit flag, the payload size, an
offset to the payload and the payload data in the following structure.

Figure 14. Structure of the decrypted data of NOOPLDR Type 1
download

Once the decryption succeeds, NOOPLDR Type 1 tries to store the payload in the
registry for stealthy persistence. The encryption algorithm is still AES256-CBC,
but the AES key and IV are generated based on a machine’s Device ID and a
hostname. The device ID is retrieved from the registry key
“HKLM\Software\Microsoft\SQMClient\MachineId," which contains the machine's
unique GUID. NOOPLDR Type 1 calculates the SHA384 hash of the concatenated
Device ID and hostname and follows the same procedure in the decryption routine,
splitting the hash value into chunks of 32 bytes and 16 bytes for AES key and IV
respectively.

NOOPLDR Type 1 then prepends the SHA256 hash of the encrypted payload and stores
it in the registry "(HKLM|HKCU)\Software\License\{HEX}”, which “HEX” is a hex
string of the last 16 bytes of the SHA256 hash of the hostname. Since this
encryption procedure uses a unique value for each infected machine, we need to
preserve additional info and data, such as registry hive and hostname, to
smoothly decrypt the payload. If NOOPLDR Type 1 successfully stores the payload
in the registry, it deletes the encrypted file on a disk. Therefore, in the
second and subsequent execution time, NOOPLDR Type 1 reads the registry key and
decrypts the payload in the same procedure as the encryption routine.

Figure 15. Procedure to store an encrypted payload in the registry by NOOPLDR
Type 1
download

In the final step, NOOPLDR Type 1 injects and runs the decrypted payload into a
legitimate application, such as rdrleakdiag.exe and tabcal.exe. If NOOPLDR Type
1 fails to store the payload in the registry, it writes the encrypted payload
into a disk again and overwrites it with the same timestamp as the built-in
kernel32.dll.

Another type of NOOPLDR in the form of a DLL, which we call NOOPLDR Type 2,
adopts a similar strategy to Type 1 but implements more stealthy techniques. As
Figure 16 illustrates, during the first execution, NOOPLDR Type 2 also decrypts
the encrypted payload from a file and stores the encrypted payload in the
registry. It injects the decrypted payload into the legitimate application.

Figure 16. Execution flow of NOOPLDR Type 2 (DLL)
download

One of the notable features of NOOPLDR Type 2 is the use of multiple
anti-analysis techniques. For instance, it is heavily obfuscated by control flow
obfuscation and junk codes, as shown in Figure 17. Earth Kasha has already
applied this type of obfuscation technique in the previous campaign, but even
before that, it’s been popular among China-nexus adversaries, such as APT10 and
Twisted Panda.

Figure 17. Control Flow Obfuscation (Left) and Junk Code (Right)
download

For the additional anti-analysis technique, most strings are simply encoded by
XOR, which is decoded on runtime.

Figure 18. String decoding routine by XOR
download

NOOPLDR Type 2 is designed to be executed via DLL Side-Loading. NOOPLDR Type 2
supports self-installation as Windows Service by running with the "-install"
parameter. During the first execution, it loads an encrypted payload named
“<LOADER_PROCESS_NAME>_config” in the current working directory, which will be
deleted after installation. For instance, if the loader process name is
“symstore.exe," the encrypted file would be "symstore.exe_config." The encrypted
blob structure is like the Type 1 but slightly different. It doesn’t have a
checksum section; it simply has 32-byte AES key materials followed by an
encrypted payload, as Figure 19 shows. The encrypted payload is encrypted by
AES256-CBC. The AES key is generated based on the SHA1 of the first 32 bytes,
and IV is the first 16 bytes.

Figure 19. Structure of the encrypted data of NOOPLDR Type 2
download

Like the NOOPLDR Type 1, the decrypted data has a 0x14 bytes header containing
several values used to verify if it’s an expected structure, as Figure 20 shows.

Figure 20. Structure of the decrypted data of NOOPLDR Type 2
download

After verification, NOOPLDR Type 2 encrypts the decrypted data again with
AES256-CBC but with a different key, which consists of a Device ID string,
hardcoded key material in the code section and randomly generated 8-byte hex
string and stores it in “HKCU\SOFTWARE\Microsoft\COM3\<RANDOM_HEX_STRTING>," as
Figure 21 shows.

Figure 21. Procedure to store an encrypted payload in the registry by NOOPLDR
Type 2
download

In the second and subsequent execution time, NOOPLDR Type 2 will be executed
without the "-install" parameter. Therefore, it skips self-installation and
proceeds to the payload decryption routine from the registry. It searches
registry data in the registry (HKCU\SOFTWARE\Microsoft\COM3), and if found, it
decrypts the encrypted data by the same method in Figure 21 but using the HEX
string in the registry key as a part of AES key material.

At last, NOOPLDR Type 2 injects the decrypted payload into legitimate
applications, such as wuauclt.exe. This process injection technique is classic,
but leverages direct Syscall using NtProtectVirtualMemory, NtWriteVirtualMemory
and NtCreateThreadEx. Since Syscall ID can be different on running OS versions,
Syscall ID is calculated on runtime.

Figure 22. Example of usage of NtWriteVirtualMemory
download

NOOPDOOR

Now, let’s step into the final payload, NOOPDOOR. NOOPDOOR (aka HiddenFace by
ESET) is a sophisticated and complex backdoor with the following
characteristics:

 * Fully position independent code
 * Supporting active and passive mode communication
 * C&C domain changed daily by a DGA (by default)
 * Proxy-aware TCP communication during working time
 * RSA + multiple symmetric cipher to encrypt the entire C&C communication
 * Supporting build-in functions + additional modules for backdoor capabilities
 * Evading in-memory detection by encrypting/decrypting specific functions on
   runtime
 * Anti-analysis

Due to its complexity, NOOPDOOR should be designed as another backdoor choice,
especially for a high-profile target. Based on our records, NOOPDOOR was first
observed as a second-stage payload of LODEINFO in 2021, but only in limited
cases. And we have not encountered NOOPDOOR until 2023. One of the interesting
features of NOOPDOOR is that it supports two channels to communicate with the
C&C server, which we call the active and passive modes.

Figure 23. Overview architecture of NOOPDOOR
download

Figure 23 shows that NOOPDOOR in active mode communicates over TCP/443 by
polling the C&C server. NOOPDOOR in passive mode listens on TCP/47000 to receive
commands from remote adversaries. Interestingly, the active and passive modes
use different encryption algorithms and backdoor commands, respectively, which
means that both channels are incompatible and independent methods of
communication from each other. The active mode is executed in a primary thread
of NOOPDOOR. Before starting communications with the C&C server, NOOPDOOR checks
if the specific analysis tools listed in Appendix A are running in the current
machine. If any are found, NOOPDOOR will terminate itself. NOOPDOOR then
generates the C&C server's domain using a custom Domain Generation Algorithm
(DGA). NOOPDOOR has template URLs like “http://$j[].srmbr\.com/#180” (defanged)
that are used to generate the domain, and NOOPDOOR embeds a randomly generated
string based on the runtime date into the template URLs. Therefore, a domain can
be changed daily (by default, but the lifespan of domains can be changed based
on the option). A detailed DGA logic is as follows.

Figure 24. Detailed logic of DGA
download

We have also observed a few samples of NOOPDOOR that embed slightly different
types of URLs. The placeholder “$<KEY>," which is a single letter (such as “j”)
in most cases, can be a "word." In the case we observed, the template URL was
like “hxxp://$earth[.]hopto[.]org:443/”, in which the "$earth" part is the
placeholder. In such a case, the generated domain will be as follows:

Figure 25. DGA generation using “word” as the placeholder
download

With the generated domain, NOOPDOOR initiates C&C communication. NOOPDOOR
supports HTTP proxy in the victim’s environment during business hours
(8:30~19:30 from Monday to Friday). C&C communication in the active mode is
fully encrypted by a combination of RSA-2048 and symmetric cipher. On
initializing a session, NOOPDOOR sends a challenge and randomly selected
symmetric cipher ID to the C&C server with encryption by RSA-2048 to negotiate a
key for encrypting packets during the following module/command processing.
Supported ciphers are DES, 3DES, 2-key 3DES, AES-128-CBC, AES-192-CBC,
AES-256-CBC, RC2, and RC4. After key negotiation, it starts to receive commands
and sends a result with encryption by the selected cipher.

Figure 26. C&C communication flow of NOOPDOOR
download

The NOOPDOOR operator can execute a loaded module or built-in function through
backdoor commands in active mode. The built-in functions that are currently
supported are as follows:

ID (active mode) Action 3B27D4EEFBC6137C23BD612DC7C4A817 Run program
9AA5BB92E9D1CD212EFB0A5E9149B7E5 Download a file (received from the C&C server)
3C7660B04EE979FDC29CD7BBFDD05F23 Upload a file (sending to the C&C server)
12E2FC6C22B38788D8C1CC2768BD2C76 Read specific file
(%SystemRoot%\System32\msra.tlb) 2D3D5C19A771A3606019C8ED1CD47FB5 Change the
timestamp of the specified file

On the other hand, C&C communication in passive mode is much simpler. NOOPDOOR
creates a new thread for passive mode communication and prepares an incoming
connection. NOOPDOOR initially tries to add a new Windows Firewall rule named
“Cortana” to allow inbound connection to TCP/47000. C&C communication in passive
mode is encrypted by AES-128-CBC with key and IV generated based on the current
running datetime. Backdoor commands are also different from the ones in active
mode as follows.

ID (passive mode) Action 3049 (0x0BE9) Keep alive 9049 (0x2359) Run program 9050
(0x235A) Upload a file (sending to the C&C server) 9051 (0x235B) Download a file
(received from the C&C server) 9052 (0x235C) Change working directory 9053
(0x235D) Run shellcode else Returns a message “This function is not supported by
server!”

However, it should be noted that the passive mode may be useless in most cases
since the operator can’t directly access the listening instance of NOOPDOOR due
to a firewall or other network devices in a modern network. The passive mode
might be designed for NOOPDOOR being placed in a publicly exposed server
(although all the NOOPDOOR have been observed only in a local network so far) or
just for testing purposes. In fact, we have observed a few samples of NOOPDOOR
that do not implement the passive mode.

As another feature of NOOPDOOR, it supports loading modules from a disk. During
initialization, NOOPDOOR looks for a file like "%temp%\{HEX}.tmp," in which the
"{HEX}" part is generated from a portion of the SHA256 hash of a combination of
the current computer name and username (in UTF-16le). This file contains the
modules encrypted by AES-256-CBC. Module blobs consist of metadata, such as
information for scheduling, module ID, parameters, and module payload. Due to
this feature, NOOPDOOR allows them to execute additional functions at various
times (on demand or regularly).

MirrorStealer

MirrorStealer, originally documented by ESET3, is a multi-purpose credential
stealer. It is often used in conjunction with NOOPDOOR in cyberattacks. We have
observed MirrorStealer in the recent campaign as well. Currently targeted
applications are the following.

 * Stored credentials in browsers (Chrome, Firefox, Edge, InternetExplorer)
 * Stored credentials in email clients (Outlook, Thunderbird, Becky, Live Mail)
 * Stored credentials in Group Policy Preferences
 * Recently accessed server and stored credentials
 * in SQL Server Management Studio (mru.dat, SqlStudio.bin)

All the results of stolen credentials are stored in %temp%\31558.TXT as plain
text. We observed that the adversary manually checked the outputs using the
"touch” command and deleted them with the “del” command via cmd.exe.


ATTRIBUTION

As mentioned earlier, we assess the spear-phishing campaign from 2023 to early
2024 to be attributed to Earth Kasha with medium confidence. To explain the
reasoning behind our conclusion, we will analyze several campaigns.

LODEINFO Campaign #1 and #2

The following image illustrates the Diamond Model of two campaigns by Earth
Kasha. For convenience, we call the campaign being conducted in 2019 to 2023
using spear-phishing as “LODEINFO Campaign #1” and the campaign being conducted
since 2023 targeting public-facing applications as “LODEINFO Campaign #2”. The
Diamond Model highlights the overlaps between the LODEINFO Campaign #1 and #2,
leading us to speculate that these campaigns are operated by the same group
because exclusive malware was used in both campaigns. There are no major
contradictions in victimology and some parts of TTP.

Figure 27. Comparison between the LODEINFO Campaign #1 and #2 by using the
Diamond Model
download

On the other hand, there are several differences between the LODEINFO Campaign
#1 and #2, especially in Initial Access methods, which are completely updated.
In Campaign #1, they were using spear-phishing for Initial Access, but in
Campaign #2, they were exploiting public-facing applications for Initial Access.
Regarding victimology, there are some differences in the targeted industry. The
public sector, individuals associated with international affairs, politicians,
and researchers in the academic sector were targeted in Campaign #1. However,
the private sector, including manufacturing and aviation, hi-tech-related
organizations, and government agencies, were targeted in Campaign #2.

A41APT Campaign and LODEINFO Campaign #2

We analyzed another campaign, known as “A41APT Campaign” by Earth Tengshe, which
is also believed to be related to APT10. This group conducted a campaign
targeting several countries, including Japan and Taiwan. The following image
uses the Diamond Model to highlight the overlaps between the A41APT Campaign and
the LODEINFO Campaign #2.

Figure 28 Comparison between the A41APT Campaign and the LODEINFO Campaign #1 by
using the Diamond Model

Interestingly, the A41APT Campaign has a lot of overlaps, especially in TTPs of
the Post-Exploitation phase. As the presentation on the A41APT Campaign in
JSAC2021 shows, there are similar TTPs in both campaigns, such as exploiting
SSL-VPN for Initial Access, schedule task abuse for Persistence, RDP by domain
admin account for Lateral Movement, abusing csvde.exe to collect Active
Directory account information, and dumping registry hives for Credential Access.

Figure 29. Highlighting the overlapped TTPs from the presentation “A41APT Case”
in JSAC2021 10
download

The major difference in these campaigns is the toolsets. Earth Tengshe used
custom malware, such as SigLoader, SodaMaster, P8RAT, FYAnti, and Jackpot, which
completely differ from Earth Kasha's use in LODEINFO Campaign #2.

Considering that Earth Tengshe and Earth Kasha are believed to be associated
with APT10, both groups may have relationships in TTPs or may share operator
resources. Here is a summary of the comparison between the A41APT Campaign, the
LODEINFO Campaign #1 and #2.

  A41APT Campaign LODEINFO Campaign #1 LODEINFO Campaign #2 Attribution Earth
Tengshe Earth Kasha Earth Kasha Timeline 2020 - 2021 2019 – present 2023 –
present Region Japan, Taiwan, Thailand, and the United States (but the main
target is the entity in Japan) Japan Japan, Taiwan, and India Industry private
sector, including electronics, energy, automotive, and defense industries public
sector, individuals associated with international affairs, politicians and
researchers in the academic sector - private sector, including manufacturing and
aviation
- Hi-tech related organizations
- government agencies TTPs - Exploit public-facing application
- DLL Side-Loading
- MS13-098/CVE-2013-3900 to embed encrypted payload - Spear-phishing email
- DLL Side-Loading
- MS13-098/CVE-2013-3900 to embed encrypted payload - Exploit public-facing
application
- DLL Side-Loading
- MS13-098/CVE-2013-3900 to embed encrypted payload Tools - SigLoader
- HUI Loader
- SodaMaster
- P8Rat
- FYAnti
- Cobalt Strike
- Jackpot - LODEINFO
- NOOPDOOR
- DOWNIISSA
- Lilim RAT
- MirrorStealer - LODEINFO
- NOOPDOOR
- Cobalt Strike
- MirrorStealer

Other Campaigns

Adding to these campaigns, we have observed a few other campaigns that slightly
show some overlaps with the LODEINFO Campaign #2.

Our first observation in 2023 shows that the Initial Access and Target methods
resemble those of the LODEINFO Campaign #2. This unclustered campaign targeted
mainly Japan and abused an exploitation against public-facing applications for
Initial Access. Additionally, we confirmed that both campaigns used the same IPs
as the origin of exploitation. On the other hand, we didn’t observe any malware
or hacking tools during this unclustered campaign. The adversary employed
LOLBins in Post-Exploitation, not malware.

Figure 30. Infrastructure overlap with the unclustered campaign
download

Furthermore, Volt Typhoon, which is a state-sponsored actor based in China
documented by Microsoft, was reportedly carrying out the exploit against
FortiOS/FortiProxy (CVE-2023-27997), which was also used in the LODEINFO
Campaign #2 in 2023. However, TTPs and toolsets in Post-Exploitation were
totally different between Volt Typhoon and Earth Kasha (instead, the previously
mentioned unclustered campaign looks similar, but no commonalities have been
confirmed so far). The vulnerability of CVE-2023-27997 was 0-day at the time of
usage in both campaigns by Volt Typhoon and Earth Kasha, leading us to the
assumption that the 0-day vulnerability was possibly shared or there might be a
third-party entity, such as access brokers, specialized in facilitating Initial
Access. This is not the only case indicating the possibility of 0-day
vulnerability sharing.

LAC reported the multiple campaigns, abusing Array AG (CVE-2023-28461) and
Citrix (CVE-2023-3466, CVE-2023-3467, CVE-2023-3519), which were abused in the
LODEINFO Campaign #2 in 2023 as well. Besides the vulnerabilities, however,
there are no overlaps in malware and TTPs in Post-Exploitation between the
LODEINFO Campaign #2 and these campaigns. This case suggests the possibility of
0-day sharing or the presence of an access broker, indicating that Earth Kasha
may be part of such an ecosystem.


TREND MICRO VISION ONE THREAT INTELLIGENCE

To stay ahead of evolving threats, Trend Micro customers can access a range of
Intelligence Reports and Threat Insights within Trend Micro Vision One. Threat
Insights helps customers stay ahead of cyber threats before they happen and
better prepared for emerging threats. It offers comprehensive information on
threat actors, their malicious activities, and the techniques they use. By
leveraging this intelligence, customers can proactively protect their
environments, mitigate risks, and respond effectively to threats.

Trend Micro Vision One Intelligence Reports App [IOC Sweeping]

 * Spot the difference: Earth Kasha's new LODEINFO campaign and the correlation
   analysis with the APT10 umbrella

Trend Micro Vision One Threat Insights App

 * Threat Actors:
   
   * Earth Kasha
   * Earth Tengshe
 * Emerging Threats: Spot the difference: Earth Kasha's new LODEINFO campaign
   and the correlation analysis with the APT10 umbrella


HUNTING QUERIES

Trend Micro Vision One Search App

Trend Micro Vision Once Customers can use the Search App to match or hunt the
malicious indicators mentioned in this blog post with data in their
environment.   

Malware Detection Associated with Earth Kasha

eventName:MALWARE_DETECTION AND malName:(*NOOPLDR* OR *NOOPDOOR* OR *LODEINFO*)

More hunting queries are available for Vision One customers with Threat Insights
Entitlement enabled.


CONCLUSION

We have revealed the new campaign by Earth Kasha and provided an in-depth
analysis of LODEINFO, NOOPDOOR and other malware. Additionally, we have analyzed
several campaigns in the past and present, suggesting a connection with the
previous LODEINFO campaign (LODEINFO Campaign #1) and interesting overlaps with
the A41APT Campaign by Earth Tengshe, which is also believed to belong to APT10
Umbrella. These findings lead us to conclude that the same group that conducted
the previous LODEINFO campaign also conducted the recent LODEINFO campaign
(LODEINFO Campaign #2) with significant TTPs updates. The group may be
incorporating or sharing TTPs and tools with Earth Tengshe. Furthermore, our
correlational analysis of several campaigns, including the ones by the Volt
Typhoon and other unclustered groups, suggested that the 0-day vulnerabilities
may be shared among China-nexus actors, or there may be third-party access
brokers.

Our research on the recent activity by Earth Kasha highlighted the current
complex situation and potential cooperative relationships among China-nexus
threat actors. Such a situation will likely continue because it’s beneficial for
the adversaries on effective operation and hard for threat intelligence analysts
on the attribution. We all need to understand the current complex background and
carefully work on the attribution process.



 * Appendix A: Checked Applications for Anti-Analysis by NOOPDOOR
 * x32dbg**.exe
 * x64dbg**.exe
 * llydbg**.exe
 * windbg**.exe
 * ida*.exe
 * idaq*.exe
 * ImmunityDebugger*.exe
 * ProcessHacker*.exe
 * Stud_PE*.exe
 * pexplorer*.exe
 * Autoruns*.exe
 * procexp*.exe
 * Procmon*.exe
 * Tcpview*.exe
 * 010Editor*.exe
 * WinHex*.exe
 * Wireshark*.exe
 * zenmap*.exe
 * ProcessHacker*.exe
 * vmmap*.exe
 * load_sc*.exe
 * HttpAnalyzerStd*.exe
 * Fiddler*.exe


APPENDIX B: INDICATORS OF COMPROMISE (IOCS)

The indicators of compromise can be found here: 

Tags
APT und gezielte Angriffe | Endpunkte | Research | Artikel, Nachrichten,
Berichte


AUTHORS

 * Hara Hiroaki
   
   Customer Technology Specialist

Contact Us
Subscribe


RELATED ARTICLES

 * API-Sicherheit: Gefahren im Registry
 * Die Lieferkette im Zentrum der Risikobetrachtung
 * Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral
   Movement

See all articles


Überzeugen Sie sich selbst von der einheitlichen Plattform – kostenlos


 * Fordern Sie die Lizenz für Ihren 30-tägigen Test an

 * 
 * 
 * 
 * 
 * 


RESSOURCEN

 * Blog
 * Newsroom
 * Berichte zu Bedrohungen
 * Partner suchen
 * 
 * 


SUPPORT

 * Support-Portal für Unternehmen
 * Kontakt
 * Downloads
 * Kostenlose Testversionen
 * 
 * 


ÜBER TREND

 * Info
 * Impressum
 * Karriere bei Trend Micro
 * Standorte
 * Veranstaltungshinweise
 * Trust Center
 * 

Hauptniederlassung DACH

Trend Micro - Germany (DE)

Parkring 29
85748 Garching
Deutschland

Telefon: +49 (0)89 8393 29700

Land/Region auswählen

Deutschland, Österreich, Schweiz expand_more
close

NORD-, MITTEL- UND SÜDAMERIKA

 * USA
 * Brasilien
 * Kanada
 * Mexiko

NAHER OSTEN UND AFRIKA

 * Südafrika
 * Naher Osten und Nordafrika

EUROPA

 * Belgien (België)
 * Tschechische Republik
 * Dänemark
 * Deutschland, Österreich, Schweiz
 * Spanien
 * Frankreich
 * Irland
 * Italien
 * Niederlande
 * Norwegen (Norge)
 * Polen (Polska)
 * Finnland (Suomi)
 * Schweden (Sverige)
 * Türkei (Türkiye)
 * Vereinigtes Königreich

ASIEN-PAZIFIK

 * Australien
 * Центральная Азия (Mittelasien)
 * Hongkong (Englisch)
 * Hongkong (香港 (中文))
 * Indien (भारत गणराज्य)
 * Indonesien
 * Japan (日本)
 * Südkorea (대한민국)
 * Malaysia
 * Монголия (Mongolei) und Грузия (Georgien)
 * Neuseeland
 * Philippinen
 * Singapur
 * Taiwan (台灣)
 * ประเทศไทย (Thailand)
 * Vietnam

Datenschutz | Rechtliches | Sitemap

Copyright ©2024 Trend Micro Incorporated. Alle Rechte vorbehalten

Copyright ©2024 Trend Micro Incorporated. Alle Rechte vorbehalten


sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk
This website uses cookies for website functionality, traffic analytics,
personalization, social media functionality and advertising. Our Cookie Notice
provides more information and explains how to amend your cookie settings.Learn
more
Cookies Settings Accept


✓
Danke für das Teilen!
AddToAny
Mehr…

BDOW!
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1