www.trendmicro.com
Open in
urlscan Pro
23.206.209.41
Public Scan
URL:
https://www.trendmicro.com/de_de/research/24/k/earth-estries.html
Submission: On November 26 via api from IN — Scanned from DE
Submission: On November 26 via api from IN — Scanned from DE
Form analysis
1 forms found in the DOM<form class="main-menu-search" aria-label="Search Trend Micro">
<div class="main-menu-search__field-wrapper" id="cludo-search-form">
<table class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<input type="text" class="gsc-input-field" name="search" title="search" placeholder="Search" autocomplete="off" aria-label="search">
</td>
</tr>
</tbody>
</table>
</div>
</form>
Text Content
Unternehmen search close * Lösungen * Nach Aufgabe * Nach Aufgabe * Nach Aufgabe Mehr erfahren * NIS2-Richtlinie * NIS2-Richtlinie Mehr erfahren * Risiken verstehen, priorisieren und eindämmen * Risiken verstehen, priorisieren und eindämmen Minimieren Sie Risiken durch Angriffsflächenmanagement. Mehr erfahren * Schutz für Cloud-native Anwendungen * Schutz für Cloud-native Anwendungen Genießen Sie Sicherheit, die positive Geschäftsergebnisse ermöglicht. Mehr erfahren * Schutz für Ihre Hybrid Cloud * Schützen Sie Ihre Hybrid- und Multi-Cloud-Welt Gewinnen Sie Transparenz und erfüllen Sie Geschäftsanforderungen in puncto Sicherheit. Mehr erfahren * Schutz Ihrer verteilten Belegschaft * Schutz Ihrer verteilten Belegschaft Ermöglichen Sie überall und auf jedem Gerät sichere Verbindungen. Mehr erfahren * Beseitigen Sie blinde Flecken im Netzwerk * Beseitigen Sie blinde Flecken im Netzwerk Schützen Sie Anwender und wichtige Abläufe in Ihrer gesamten Umgebung. Mehr erfahren * Mehr sehen. Schneller reagieren. * Mehr sehen. Schneller reagieren. Bleiben Sie der Konkurrenz einen Schritt voraus – mit leistungsstarken, speziell entwickelten XDR-Funktionen, Angriffsflächenmanagement und Zero-Trust-Funktionen Weitere Informationen * Erweitern Sie Ihr Team * Erweitern Sie Ihr Team. Reagieren Sie agil auf Bedrohungen. Maximieren Sie Ihre Effektivität mit proaktiver Risikoeindämmung und Managed Services. Weitere Informationen * Operationalisierung von Zero-Trust-Funktionen – * Operationalisierung von Zero-Trust-Funktionen – Verstehen Sie Ihre Angriffsfläche und bewerten Sie Ihr Risiko in Echtzeit. Passen Sie Richtlinien für das gesamte Netzwerk, alle Arbeitslasten und Geräte von einer einzigen Konsole aus an. Mehr erfahren * Nach Rolle * Nach Rolle * Nach Rolle Mehr erfahren * CISO * CISO Steigern Sie Ihren Geschäftswert durch messbare Ergebnisse zur Cybersicherheit. Mehr erfahren * SOC-Manager * SOC-Manager Mehr erkennen, schneller reagieren Mehr erfahren * Infrastrukturmanager * Infrastrukturmanager Entwickeln Sie Ihr Sicherheitskonzept weiter, um Bedrohungen schnell und effektiv zu erkennen. Mehr erfahren * Cloud-Entwickler * Cloud-Entwickler Stellen Sie sicher, dass Code nur erwartungsgemäß ausgeführt wird. Mehr erfahren * Cloud-SecOps * Cloud-SecOps Gewinnen Sie mehr Transparenz und Kontrolle mit Sicherheitslösungen, die speziell für Cloud-Umgebungen entwickelt wurden. Mehr erfahren * Nach Branche * Nach Branche * Nach Branche Mehr erfahren * Gesundheitswesen * Gesundheitswesen Schutz von Patientendaten, Geräten und Netzwerken bei gleichzeitiger Einhaltung der Vorschriften Weitere Informationen * Fertigung * Fertigung Schutz von Produktionsumgebungen – von traditionellen Geräten bis hin zu hochmodernen Infrastrukturen Weitere Informationen * Öl und Gas * Öl und Gas ICS-/OT-Sicherheit für Versorgungsbetriebe in der Öl- und Gasbranche Mehr erfahren * Stromerzeugung * Stromerzeugung ICS-/OT-Sicherheit für Stromerzeugungsbetriebe Mehr erfahren * Automobilbranche * Automobilbranche Mehr erfahren * 5G-Netze * 5G-Netze Mehr erfahren * Öffentlicher Sektor & Gesundheitswesen * Öffentlicher Sektor & Gesundheitswesen Weitere Informationen * Sicherheit für kleine und mittelständische Unternehmen * Sicherheit für kleine und mittelständische Unternehmen Stoppen Sie Bedrohungen mit benutzerfreundlichen Lösungen, die für Ihr wachsendes Unternehmen entwickelt wurden Weitere Informationen * NIS2 & ISG & LSI * NIS2-Richtlinie * NIS2-Richtlinie Mehr erfahren * ISG – Informationssicherheitsgesetz * ISG – Informationssicherheitsgesetz Mehr erfahren * LSI - Loi sur la Sécurité de l'Information * LSI - Loi sur la Sécurité de l'Information Mehr erfahren * Plattform * Vision One Plattform * Vision One Plattform * Trend Vision One Einheitliche Plattform Verbindet den Schutz vor Bedrohungen und das Management des Cyberrisikos Weitere Informationen * Companion-KI * Trend Vision One Companion Ihr Cybersicherheitsassistent mit generativer KI Weitere Informationen * Endpunktsicherheit * Endpunktsicherheit * Endpunktsicherheit – Übersicht Schützen Sie Ihre Endpunkte in jeder Phase eines Angriffs Weitere Informationen * Industrial Endpoint Security * Industrial Endpoint Security Mehr erfahren * Workload Security * Workload Security Optimierte Prävention, Erkennung und Reaktion für Endpunkte, Server und Cloud-Workloads Weitere Informationen * Mobile Security * Mobile Security Schützen Sie sich gegen Malware, schädliche Anwendungen und andere mobile Bedrohungen, on Premises und in der Cloud. Weitere Informationen * XDR for Endpoint * XDR for Endpoint Stoppen Sie Angriffe schneller. Nutzen Sie eine breitere Perspektive und besseren Kontext, um Bedrohungen auf einer einzigen Plattform zu jagen, zu entdecken, zu untersuchen und auf sie zu reagieren. Weitere Informationen * Cloud Security * Cloud Security * Trend Vision One™ Cloud-Sicherheit – Übersicht Bauen Sie auf die bewährte Cloud-Sicherheitsplattform für Entwickler, Sicherheitsteams und Unternehmen. Weitere Informationen * Workload Security * Workload Security Schützen Sie Ihr Rechenzentrum, die Cloud und Container ohne Leistungseinbußen – nutzen Sie eine Cloud-Sicherheitsplattform mit CNAPP-Funktionen Mehr erfahren * Container Security * Container-Sicherheit Vereinfachen Sie die Sicherheit für Ihre Cloud-nativen Anwendungen durch erweitertes Container-Image-Scanning, richtlinienbasierte Zugriffssteuerung und Container-Laufzeitschutz. Mehr erfahren * File Security * File Security Schützen Sie Anwendungsworkflows und Cloud-Speicher vor neuen und komplexen Bedrohungen Mehr erfahren * Angriffsflächen-Risikomanagement für die Cloud * Angriffsflächen-Risikomanagement für die Cloud Erkennung von Cloud-Assets, Priorisieren von Schwachstellen, Management des Cloud-Sicherheitsstatus und Angriffsflächenmanagement – alles in einem Weitere Informationen * XDR für die Cloud * XDR für die Cloud Erweiterung der Transparenz auf die Cloud und Optimierung von SOC-Untersuchungen Weitere Informationen * Netzwerksicherheit * Netzwerksicherheit * Network Security – Übersicht Erweitern Sie die Leistungsfähigkeit von XDR durch Network Detection and Response (NDR). Mehr erfahren * Network Intrusion Prevention (IPS) * Network Intrusion Prevention (IPS) Schutz vor bekannten, unbekannten und noch nicht offengelegten Sicherheitslücken in Ihrem Netzwerk Mehr erfahren * Breach Detection System (BDS) * Breach Detection System (BDS) Erkennen Sie gezielte Angriffe im eingehenden, ausgehenden und lateralen Datenverkehr und reagieren Sie darauf. Mehr erfahren * Secure Service Edge (SSE) * Secure Service Edge (SSE) Definieren Sie Vertrauen neu und sorgen Sie durch kontinuierliche Risikobewertungen für eine sichere digitale Transformation. Mehr erfahren * Industrial Network Security * Industrial Network Security Mehr erfahren * XDR für Netzwerke * XDR für Netzwerke Stoppen Sie Angriffe schneller. Nutzen Sie eine breitere Perspektive und besseren Kontext, um Bedrohungen auf einer einzigen Plattform zu jagen, zu entdecken, zu untersuchen und auf sie zu reagieren. Weitere Informationen * 5G-Netzwerksicherheit * 5G-Netzwerksicherheit Weitere Informationen * End-of-Support-Plattformen und -Betriebssysteme * End-of-Support-Plattformen und -Betriebssysteme Mehr erfahren * Alle Produkte, Services und Testversionen * Alle Produkte, Services und Testversionen Weitere Informationen * Angriffsflächenmanagement * Angriffsflächenmanagement Datenlecks frühzeitig verhindern Weitere Informationen * E-Mail-Sicherheit * E-Mail-Sicherheit * E-Mail-Sicherheit Stoppen Sie die Infiltration Ihres Unternehmens durch Phishing, Malware, Ransomware, Betrug und gezielte Angriffe Weitere Informationen * Schutz für E-Mail und Kollaboration * Trend Vision One™ Schutz für E-Mail und Kollaboration Stoppen Sie Phishing, Ransomware und gezielte Angriffe auf jeden E-Mail-Service, einschließlich Microsoft 365 und Google Workspace Weitere Informationen * XDR (Extended Detection and Response) * XDR (Extended Detection and Response) Stoppen Sie Angriffe schneller. Nutzen Sie eine breitere Perspektive und besseren Kontext, um Bedrohungen auf einer einzigen Plattform zu jagen, zu entdecken, zu untersuchen und auf sie zu reagieren. Mehr erfahren * Threat Insights * Einblicke in Bedrohungen Erkennen Sie Bedrohungen schon von Weitem Weitere Informationen * OT-Sicherheit * OT-Sicherheit * OT-Sicherheit Lernen Sie Lösungen für ICS-/OT-Sicherheit kennen. Weitere Informationen * Industrial Endpoint Security * Industrial Endpoint Security Weitere Informationen * Industrial Network Security * Industrial Network Security Industrial Network Security * XDR für OT * XDR für OT Stoppen Sie Angriffe schneller. Nutzen Sie eine breitere Perspektive und besseren Kontext, um Bedrohungen auf einer einzigen Plattform zu jagen, zu entdecken, zu untersuchen und auf sie zu reagieren. Weitere Informationen * Identity Security * Identity Security Durchgängige Identity Security vom Identity Posture Management bis zu Detection and Reponse Mehr erfahren * On-Premises Data Sovereignty * Lokale Datenhoheit Verhinderung, Erkennung, Reaktion und Schutz ohne Kompromisse bei der Datenhoheit Mehr erfahren * Informationen * Informationen * Informationen * Informationen Mehr erfahren * Research, Neuigkeiten und Perspektiven * Research, Neuigkeiten und Perspektiven Mehr erfahren * Research und Analyse * Research und Analyse Mehr erfahren * IT Security Best Practices * IT Security Best Practices Mehr erfahren * Nachrichten zum Thema Sicherheit * Nachrichten zum Thema Sicherheit Mehr erfahren * Zero-Day-Initiative (ZDI) * Zero-Day-Initiative (ZDI) Mehr erfahren * Services * Trend Micro Services * Trend Micro Services * Trend Micro Services Mehr erfahren * Servicepakete * Servicepakete Verstärken Sie Ihre Sicherheitsteams: Rund-um-die-Uhr-Service für Managed Detection, Response und Support. Mehr erfahren * Managed XDR * Managed XDR Ergänzen Sie Ihr Team mit einem von Experten gemanagten Service für Erkennung und Reaktion (Managed Detection and Response, MDR) für E-Mails, Endpunkte, Server, Cloud-Workloads und Netzwerke. Mehr erfahren * Support Services * Support Services Mehr erfahren * Reaktionen auf Vorfälle * Reaktionen auf Vorfälle * Reaktionen auf Vorfälle Vertrauenswürdige Fachleute helfen Ihnen jederzeit gerne, egal ob Sie von einem Sicherheitsvorfall betroffen sind oder Ihre IR-Pläne proaktiv verbessern möchten. Weitere Informationen * Versicherungsanbieter und Anwaltskanzleien * Versicherungsanbieter und Anwaltskanzleien Vermeiden Sie Sicherheitsverletzungen mit einer erstklassigen Lösung zur Erkennung und Reaktion und reduzieren Sie die Kosten Ihrer Kunden für Ausfallzeiten und Schadensfälle. Mehr erfahren * Partner * Alliance Partner * Alliance Partner * Alliance Partner Trend arbeitet mit den Besten zusammen, um sie dabei zu begleiten, ihre Leistung und ihren Wert zu optimieren Weitere Informationen * Technology Alliance Partner * Technology Alliance Partner Mehr erfahren * Alliance Partner suchen * Alliance Partner suchen Weitere Informationen * Partner suchen * Partner suchen Finden Sie einen örtlichen Partner, bei dem Sie Lösungen von Trend Micro kaufen können. Weitere Informationen * Partnerprogramm * Partnerprogramm * Partnerprogramm Übersicht Bauen Sie Ihr Business aus und schützen Sie Ihre Kunden – durch umfassende, mehrschichtige Sicherheit für höchste Ansprüche Weitere Informationen * Kompetenzen der Partner * Kompetenzen der Partner Heben Sie sich vom Mitbewerb ab, indem Sie Ihre Kompetenz mit entsprechenden Nachweisen belegen Weitere Informationen * Managed Security Service Provider * Managed Security Service Provider Bereitstellung moderner Sicherheitsdienstleistungen mit branchenführendem XDR Weitere Informationen * Managed Service Provider * Managed Service Provider Arbeiten Sie mit einem führenden Experten für Cybersicherheit zusammen und nutzen Sie bewährte Lösungen speziell für MSPs. Weitere Informationen * Erfolge von Partnern * Erfolge von Partnern Weitere Informationen * Partnerressourcen * Partnerressourcen * Partnerressourcen Entdecken Sie Ressourcen, die das Wachstum Ihres Geschäfts ankurbeln und Ihre Möglichkeiten als Partner von Trend Micro verbessern Weitere Informationen * Partner werden * Partner werden Weitere Informationen * Trend Campus * Trend Campus Lernen Sie schneller mit Trend Campus, der benutzerfreundlichen Bildungsplattform, die personalisierte technische Unterstützung bietet Weitere Informationen * Co-Selling * Co-Selling Greifen Sie auf kollaborative Services zu, die Ihnen helfen, den Wert von Trend Vision One™ zu demonstrieren und Ihr Business auszubauen Weitere Informationen * Distributoren * Distributoren Weitere Informationen * Partnerportal-Anmeldung * Partnerportal-Anmeldung Anmelden * Unternehmen * Warum Trend Micro? * Warum Trend Micro? * Warum Trend Micro? Weitere Informationen * C5-Testat * C5-Testat Weitere Informationen * Kundenreferenzen * Kundenreferenzen Mehr erfahren * Branchenauszeichnungen * Branchenauszeichnungen Mehr erfahren * Strategische Partnerschaften * Strategische Partnerschaften Mehr erfahren * Trend Micro vergleichen * Trend Micro vergleichen * Trend Micro vergleichen So überflügelt Trend seine Mitbewerber Los geht’s * mit CrowdStrike * Trend Micro versus CrowdStrike CrowdStrike bietet mit seiner Cloud-nativen Plattform effektive Cybersicherheit. Die Preise könnten jedoch zu hoch sein, vor allem für Unternehmen, die eine kosteneffiziente Skalierbarkeit über eine einzige Plattform anstreben. Los geht’s * mit Microsoft * Trend Micro versus Microsoft Microsoft bietet einen grundlegenden Schutz, benötigt jedoch oft zusätzliche Lösungen, um die Sicherheitsprobleme der Kunden vollständig zu lösen. Los geht’s * mit Palo Alto Networks * Trend Micro versus Palo Alto Networks Palo Alto Networks bietet fortschrittliche Cybersicherheitslösungen. Die Navigation in der umfangreichen Suite kann jedoch komplex sein, und die Freischaltung aller Funktionen erfordert erhebliche Investitionen. Los geht’s * Info * Info * Info Mehr erfahren * Impressum * Impressum Mehr erfahren * Trust Center * Trust Center Mehr erfahren * Geschichte * Geschichte Mehr erfahren * Diversität, Fairness und Inklusion * Diversität, Fairness und Inklusion Mehr erfahren * Soziale Unternehmensverantwortung * Soziale Unternehmensverantwortung Mehr erfahren * Management * Management Mehr erfahren * Sicherheitsexperten * Sicherheitsexperten Mehr erfahren * Weiterbildungsangebote in den Bereichen Internetsicherheit und Cybersicherheit * Weiterbildungsangebote in den Bereichen Internetsicherheit und Cybersicherheit Mehr erfahren * Rechtliche Hinweise * Rechtliche Hinweise Mehr erfahren * Formel-E-Rennen * Formel-E-Rennen Weitere Informationen * Kontakt aufnehmen * Kontakt aufnehmen * Kontakt aufnehmen Mehr erfahren * Newsroom * Newsroom Mehr erfahren * Veranstaltungen * Veranstaltungen Mehr erfahren * Karriere * Karriere Mehr erfahren * Webinare * Webinare Mehr erfahren Back Back Back Back * Kostenlose Testversionen * Kontakt Sie suchen nach Lösungen für zu Hause? Sie werden angegriffen? 0 Warnungen Back Ungelesen Alles Folio (0) Support * Support-Portal für Unternehmen * Weiterbildung und Zertifizierung * Kontakt mit dem Support * Supportpartner finden Ressourcen * KI-Sicherheit * Trend Micro versus Mitbewerb * Cyber Risk Index/Assessment * Was ist ...? * Enzyklopädie der Bedrohungen * Cyber-Versicherung * Glossar der Begriffe * Webinare Anmelden * Vision One * Support * Partnerportal * Cloud One * Produktaktivierung und -management * Referenzpartner Back arrow_back search close Content has been added to your Folio Go to Folio (0) close APT und gezielte Angriffe GAME OF EMPEROR: UNVEILING LONG TERM EARTH ESTRIES CYBER INTRUSIONS Since 2023, APT group Earth Estries has aggressively targeted key industries globally with sophisticated techniques and new backdoors, like GHOSTSPIDER and MASOL RAT, for prolonged espionage operations. By: Leon M Chang, Theo Chen, Lenart Bermejo, Ted Lee November 25, 2024 Read time: 14 min (3744 words) Save to Folio Subscribe -------------------------------------------------------------------------------- SUMMARY * * Earth Estries, a Chinese APT group, has primarily targeted critical sectors like telecommunications and government entities across the US, Asia-Pacific, Middle East, and South Africa since 2023. * The group employs advanced attack techniques and multiple backdoors, such as GHOSTSPIDER, SNAPPYBEE, and MASOL RAT, affecting several Southeast Asian telecommunications companies and government entities. * Earth Estries exploits public-facing server vulnerabilities to establish initial access and uses living-off-the-land binaries for lateral movement within networks to deploy malware and conduct long-term espionage. * The group has compromised over 20 organizations, targeting various sectors including telecommunications, technology, consulting, chemical, and transportation industries, as well as government agencies and NGOs in numerous countries. * Earth Estries uses a complex C&C infrastructure managed by different teams, and their operations often overlap with TTPs of other known Chinese APT groups, indicating possible use of shared tools from malware-as-a-service providers. Since 2023, Earth Estries (aka Salt Typhoon, FamousSparrow, GhostEmperor and UNC2286) has emerged as one of the most aggressive Chinese advanced persistent threat (APT) groups, primarily targeting critical industries such as telecommunications and government entities in the US, the Asia-Pacific region, the Middle East, and South Africa. In this blog entry, we will highlight their evolving attack techniques and analyze the motivation behind their operations, providing insights into their long-term targeted attacks. A key finding from our recent investigation is the discovery of a new backdoor, GHOSTSPIDER, identified during attacks on Southeast Asian telecommunications companies. We will explore the technical details of GHOSTSPIDER, its impact across multiple countries, and interesting findings when we were tracking its command-and-control (C&C) infrastructure. We have also uncovered the group’s use of the modular backdoor SNAPPYBEE (aka Deed RAT), another tool shared among Chinese APT groups. Furthermore, we discovered that Earth Estries uses another cross-platform backdoor, which we initially identified during our investigation of Southeast Asian government incidents in 2020. We named it MASOL RAT based on its PDB string. We couldn’t link MASOL RAT to any known threat group at the time due to limited information. However, this year we observed that Earth Estries has been deploying MASOL RAT on Linux devices targeting Southeast Asian government networks. More details about MASOL RAT will be provided in this blog entry. Recently, we also noticed that Microsoft has tracked the APT groups FamousSparrow and GhostEmperor under the name Salt Typhoon. However, we don’t have sufficient evidence that Earth Estries is related to the recent news of a recent Salt Typhoon cyberattack, as we have not seen a more detailed report on Salt Typhoon. Currently, we can only confirm that some of Earth Estries’ tactics, techniques, and procedures (TTPs) overlap with that of FamousSparrow and GhostEmperor. MOTIVATION We have observed that Earth Esties has been conducting prolonged attacks targeting governments and internet service providers since 2020. In mid-2022, we noticed that the attackers also started targeting service providers for governments and telecommunications companies. For example, we found that in 2023, the attackers had also targeted consulting firms and NGOs that work with the U.S. federal government and military. The attackers use this approach to gather intelligence more efficiently and to attack their primary targets more quickly. Notably, we observed that attackers targeted not only critical services (like database servers and cloud servers) used by the telecommunications company, but also their vendor network. We found that they implanted the DEMODEX rootkit on vendor machines. This vendor is a primary contractor for the region’s main telecommunications provider, and we believe that attackers use this approach to facilitate access to more targets. VICTIMOLOGY We found that Earth Estries successfully compromised more than 20 organizations in areas that include the telecommunications, technology, consulting, chemical, and transportation industries, government agencies, and non-profit organizations (NGOs). Victims also came from numerous countries, including: * Afghanistan * Brazil * Eswatini * India * Indonesia * Malaysia * Pakistan * The Philippines * South Africa * Taiwan * Thailand * US * Vietnam Figure 1. Victimology map of Earth Estries download INITIAL ACCESS Earth Estries is aggressively targeting the public-facing servers of victims. We have observed them exploiting server-based N-day vulnerabilities, including the following: Vulnerability Description Ivanti Connect Secure VPN Exploitation (CVE-2023-46805 and CVE-2024-21887) A chain of exploits to bypass authentication, craft malicious requests, and execute arbitrary commands with elevated privileges. CVE-2023-48788 Fortinet FortiClient EMS SQL Injection Vulnerability CVE-2022-3236 A code injection vulnerability in the User Portal and Webadmin of Sophos Firewall allows for remote code execution. ProxyLogon (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) A set of four chained vulnerabilities that perform remote code execution (RCE) in Microsoft Exchange servers. Table 1. The list of vulnerabilities exploited by Earth Estries After gaining control of the vulnerable server, we observed that the attackers leveraged living-off-the-land binaries (LOLBINs) like WMIC.exe and PSEXEC.exe for lateral movement, and deployed customized malware such as SNAPPYBEE, DEMODEX, and GHOSTSPIDER to conduct long-term espionage activities against their targets. CAMPAIGN OVERVIEW Our analysis suggests that Earth Estries is a well-organized group with a clear division of labor. Based on observations from multiple campaigns, we speculate that attacks targeting different regions and industries are launched by different actors. Additionally, the C&C infrastructure used by various backdoors seems to be managed by different infrastructure teams, further highlighting the complexity of the group's operations. CAMPAIGN ALPHA Figure 2. Campaign Alpha overview download In the attacks we observed last October targeting the Taiwanese government and a chemical company, we found that the attackers downloaded malicious tools from their C&C server (23.81.41[.]166). While investigating the download site (23.81.41[.]166), we found more interesting samples on the C&C server which had an open directory on port 80. Figure 3. The C&C with open directory vulnerability download The notable samples are listed in Table 2 below, based on our monitoring from October 2023 to April 2024. File Description sql.toml frpc config (C&C server: 165.154.227[.]192) onedrived.zip Contains the PowerShell script ondrived.ps1. Nsc.exe The first SNAPPYBEE sample set (SNAPPYBEE C&C domain: api.solveblemten[.]com) 123.zip/WINMM.dll NortonLog.txt 0202/* Another SNAPPYBEE sample set (imfsbSvc.exe, imfsbDll.dll, DgApi.dll, and dbindex.dat). (SNAPPYBEE C&C domain: esh.hoovernamosong[.]com) Others Open-source hacktools like frpc, NeoReGeorg tunnel, and fscan. Table 2. Notable samples Here is a summary of notable findings: * The frpc C&C 165.154.227[.]192 could be linked to an SSL certificate (SHA256: 2b5e7b17fc6e684ff026df3241af4a651fc2b55ca62f8f1f7e34ac8303db9a31) previously used by ShadowPad, which is another shared tool among several Chinese APT groups. In addition, the C&C IP address was also mentioned in a Fortinet report and indicators of compromise related to the Ivanti exploit. * We observed the TTPs used by onedrived.ps1 are similar to those of GhostEmperor’s first-stage PowerShell dropper. The only difference is that the strings are encoded using base64 algorithm in this new variant. * Based on our analysis, although the two sets of samples used different DLL hijacking combinations and decoding algorithms to decrypt the payload, we found that the backdoor characteristics matched those of the previous SNAPPYBEE. (We identified that the decrypted shellcode module header signature is 0xDEED4554 and the Main/Root module ID is still 0x20, can be seen in Figure 4). Figure 4. The analysis screenshot of SNAPPYBEE download DEMODEX ROOTKIT INFECTION CHAIN Figure 5. The infection chain of DEMODEX rootkit download There are two requirements to analyze the DEMODEX rootkit: 1. The first-stage PowerShell script requires a decryption key as an argument. 2. The second-stage service loader uses the computer name as the AES decryption key. Based on our telemetry, we discovered that the attacker used PSEXEC.exe to execute the following commands to install the DEMODEX rootkit: > Powershell.exe -ex bypass c:\windows\assembly\onedrived.ps1 > password@123 Notably, we discovered that all components related to the DEMODEX rootkit use control flow flattening techniques to increase the difficulty of analysis (Figure 6). Figure 6. DEMODEX Anti-analysis techniques (control flow flattening) download Figure 7. Core-implant malware configuration (C&C: 103.91.64[.]214) download C&C INFRASTRUCTURE ACTIVITIES While tracking the C&C infrastructure of the aforementioned backdoor, we found the following notable findings: 1. We found that one of the SNAPPYBEE C&C domains, api.solveblemten[.]com, has WHOIS registration information that overlaps with some indicators of compromise (IOCs) mentioned in Mandiant's UNC4841 report. Based on our research, we believe that these related C&C domains were likely registered by the same provider and shared them in different operations. However, we don't have sufficient evidence to consider UNC4841 as one of the subgroups related to Earth Estries. 2. Another SNAPPYBEE C&C domain (esh.hoovernamosong[.]com) resolved to a C&C IP address (158.247.222[.]165), which could be linked to a SoftEther domain (vpn114240349.softether[.]net). Therefore, we believe the threat actor also used SoftEther VPN to establish their operational networks, making it more difficult to track their activities. 3. Notably, we discovered and downloaded victim data from the SNAPPYBEE C&C (158.247.222[.]165) with an open directory on 8000 port this February. Based on our analysis, we believe the victim data was exfiltrated from a US NGO. Most of the victim data is composed of financial, human resources, and business-related documents. It's worth noting that the attacker also collected data related to multiple military units and federal government entities. POST-EXPLOITATION FINDINGS In this campaign, we observed that the attackers primarily used the following LOLbin tools to gather endpoint information and perform lateral movement to gain access to more compromised machines. Tools Description frpc related * WMIC.exe /node:<REDATED> /user:<REDATED> /password:<REDATED> process call create "cmd.exe /c expand c:/windows/debug/1.zip c:/windows/debug/notepadup.exe * cmd.exe /c ping 165.154.227.192 -n 1 > c:\Windows\debug\info. * cmd.exe /c c:/windows/debug/win32up.exe -c c:/windows/debug/sql.toml * cmd.exe /c wevtutil qe security /format:text /q:\"Event[System[(EventID=4624)]\" > c:\windows\debug\info.log ps.exe (PSEXEC.exe) * C:\Windows\assembly\ps.exe /accepteula \\<REDATED> -u <REDATED> -p <REDATED> -s cmd /c c:\Windows\assembly\1.bat * WMIC.exe /node:<REDATED> /user:<REDATED> /password:<REDATED> process call create "cmd.exe /c c:\Windows\debug\1.bat"" Table 3. LOLbin tools used to gather endpoint information and perform lateral movement CAMPAIGN BETA Figure 8. Campaign Beta overview download In this section, we will introduce Earth Estries’ long-term attacks on telecommunications companies and government entities. According to our research, most of the victims have been compromised for several years. We believe that in the early stages, the attackers successfully obtained credentials and control target machines through web vulnerabilities and the Microsoft Exchange ProxyLogon exploit chain. We observed that for these long-term targets, the attackers primarily used the DEMODEX rootkit to remain hidden within the victims' networks. Notably, in a recent investigation into attacks on telecommunications companies in Southeast Asia, we discovered a previously undisclosed backdoor; we have named it GHOSTSPIDER. GHOSTSPIDER’S TECHNIQUE ANALYSIS GHOSTSPIDER is a sophisticated multi-modular backdoor designed with several layers to load different modules based on specific purposes. This backdoor communicates with its C&C server using a custom protocol protected by Transport Layer Security (TLS), ensuring secure communication. Figure 9. The GHOSTSPIDER infection flow download Initial infection and stager deployment Based on our telemetry, we observed that the threat actor installs the first-stage stager via regsvr32.exe, which is used to install a DLL (with export names such as core.dll or spider.dll) as a service. The stager is designed to check for a specific hostname hard-coded in the DLL, ensuring that it only runs on the targeted machine. Once the stager is executed, it connects to the stager's C&C server to register a new connection and subsequently receives a module (DLL export name: login.dll) to load and execute in memory. This login module collects basic information about the infected endpoint and sends it back to the stager's C&C server. After this initial phase, the stager enters a polling mode, waiting for the threat actor's next payload. Beacon loader deployment On the infected endpoint, the threat actor deploys a legitimate executable file alongside a malicious DLL file for DLL search order hijacking. This malicious DLL, another GHOSTSPIDER module known as the beacon loader (DLL export name: loader.dll), is used to launch the beacon payload in memory. A scheduled task is created to launch the executable. The beacon loader contains an encrypted .NET DLL payload (DLL export name: client.dll), which is decrypted and executed in memory. Communication protocol The communication requests that are used by the GHOSTSPIDER stager follow a common format. A connection ID is placed in the HTTP header's cookie as “phpsessid”. The connection ID is calculated using CRC32 or CRC64 with UUID4 values. Figure 10 shows an example of a stager's first request to the C&C server. Figure 10. Example of a stager's first request to the C&C server download Here is an example of a decrypted response: =|did=96A52F5C1F2C2C67|wid=13CF3E8E0E5580EB|act=2|tt=41003562|<f The data is separated by “|” with the following items: * * An unknown prefix * * did: the connection ID calculated from the infected machine * * wid: the remote ID for a specific connection * * act: an action code * * tt: tick count * * An unknown suffix Beacon communication and command codes Like the stager, the GHOSTSPIDER beacon uses an almost identical format to communicate with the beacon C&C server to receive command codes. Table 4 outlines the command codes supported by the GHOSTSPIDER beacon. Code Action Description 1 upload Load and invoke delegate from received buffer, with 3 methods from delegate: Open / Close / Write 2 create Call the Open method from the loaded delegate 3 normal Call the Write method from the loaded delegate 4 close Unload and remove the delegate 5 update Update interval value (idle time) 6 Heartbeat Heartbeat, no action. Table 4. Command codes supported by the GHOSTSPIDER beacon The GHOSTSPIDER beacon is segmented into distinct delegates, each tailored to specific functions. These modules are retrieved from the C&C server and are reflectively loaded into memory as dictated by specific command codes. This modular design significantly enhances the backdoor's flexibility and adaptability, as individual components can be deployed or updated independently based on the attacker’s evolving needs. Additionally, it complicates detection and analysis, as analysts are forced to piece together a fragmented view of the malware’s full functionality. By isolating different capabilities across separate modules, GHOSTSPIDER not only reduces its footprint, but also makes it challenging to construct a comprehensive understanding of its operation and overall objectives. THE NEW DEMODEX INFECTION FLOW This year, we observed that the attackers used another variant of DEMODEX. In this new installation flow, the attackers no longer use a first-stage PowerShell script to deploy the additional needed payload. Instead, the required registry data (the encrypted configuration and the shellcode payload) for installation are bundled in a CAB file. The CAB bundle will be deleted after installation is finished. This approach ensures that, even after we collected the first-stage PowerShell script, the analysis cannot proceed due to the lack of additional information. We found a report published by another vendor that mentions findings consistent with our observations. Figure 11. New DEMODEX infection flow download Figure 12. The DEMODEX rootkit installation flow observed in Trend Vision One™ download ADDITIONAL C&C INFRASTRUCTURE ANALYSIS Deploying the MASOL backdoor (aka Backdr-NQ) on a Linux server While investigating the C&C infrastructure related to Campaign Alpha, we tracked the associated C&C IP (103.159.133[.]251) to a Linux backdoor (name: dash_board, SHA256: 44ea2e85ea6cffba66f5928768c1ee401f3a6d6cd2a04e0d681d695f93cc5a1f). Our analysis confirmed that this sample is linked to the MASOL RAT, which we identified in 2020 and observed being used to target Southeast Asian government entities (Figure 13). Based on the backdoor's PDB string (E:\Masol_https190228\x64\Release\Masol.pdb), we believe the backdoor may have been developed as early as 2019. We observed the new Linux variant of MASOL in the wild after 2021. However, we haven’t seen the Windows variant of MASOL after 2021. Currently, we have moderate to high confidence that Earth Estries uses MASOL RAT to target Linux servers within Southeast Asian governments recent years. Figure 13. The extracted MASOL RAT malware configuration download Based on the following reasons, we currently only have low confidence that Earth Estries has previously deployed the MASOL RAT through CVE-2022-3236: * Since August of this year, we have observed a new campaign launched by Earth Estries targeting Southeast Asian governments. Our Deep Discovery Inspector (DDI) detected a compromised Linux server communicating with the MASOL RAT C&C. During the same period, we also observed other compromised hosts within the same organization communicating with the C&C infrastructure associated with the sub-domain of CrowDoor backdoor. We will continue monitoring this ongoing campaign and may provide more details after we have completed our investigation. * We didn’t find any C&C infrastructure that overlaps between our research and the Sophos report. Although we only observed limited MASOL RAT IOCs in the wild, we cannot rule out the possibility that MASOL RAT is a shared tool among limited Chinese APT threat groups. Additional GHOSTSPIDER C&C infrastructure Currently, we do not have sufficient evidence to attribute the DEMODEX rootkit and GHOSTSPIDER as a proprietary backdoor used by Earth Estries. Therefore, we will only list the C&C infrastructure used by two campaigns discussed above in the IOC section. However, we discovered some interesting GHOSTSPIDER C&C infrastructure. In the certificate used by the GHOSTSPIDER C&C 141.255.164[.]98:2096 (C&C active timeline: August 2, 2024 to August 22, 2024), we found that one of the certificate’s alternative names, “palloaltonetworks[.]com”, was mentioned in a vendor report related to a Inc Ransom attack (Figure 14). Although we haven’t observed any GHOSTSPIDER-related incidents that links it to Inc Ransom, based on these OSINT findings, it is possible that Earth Estries may use ransomware in their operations for espionage or for financial gain. Figure 14. Certificate used by GHOSTSPIDER download ATTRIBUTION Figure 15. Attribution overview (demonstrates a possible joint operation across different units) download In our first Earth Estries blog entry, we found some TTPs that overlapped between Earth Estries and FamousSparrow. Since then, we have found the two campaigns that are related to the DEMODEX rootkit mentioned in GhostEmperor report. Since we found that the attacker also used SNAPPYBEE, we suspect that the tools used by Earth Estries might come from different malware-as-a-service (MaaS) providers. We attribute the two campaigns to Earth Estries with high confidence based on the following shared TTPs: 1. Campaign Alpha and Campaign Beta’s C&C domain shared the same WHOIS registration information. 2. Both campaigns utilized the DEMODEX rootkit and GHOSTSPIDER. 3. We observed the DEMODEX, SparrowDoor, and CrowDoor used the same C&C infrastructure in the past. Additionally, the C&C 27.102.113[.]240 was mentioned in the FamousSparrow and GhostEmperor reports. Therefore, we believe that Earth Estries has used DEMODEX, GHOSTSPIDER, SparrowDoor and CrowDoor. But we’re not sure if these customized backdoors are proprietary tools used by Earth Estries, so some of the C&C infrastructure cannot be attributed to this threat group. Based on our telemetry, we observed that the Campaign Alpha actors deployed another x86 SNAPPYBEE sample set at %SYSTEMROOT%\assembly\imfsbDll.dll (SHA256: 6d64643c044fe534dbb2c1158409138fcded757e550c6f79eada15e69a7865bc) and %SYSTEMROOT%\assembly\DgApi.dll (SHA256: 25b9fdef3061c7dfea744830774ca0e289dba7c14be85f0d4695d382763b409b) in their operations on October 10, 2024. We detected the same hashes in two other government entities. We also found that one of these government entities had been compromised by Earth Estries since 2020. Notably, SNAPPYBEE was deployed in the ZINGDOOR attack chains on October 13, 2024. This is why we believe Earth Estries used distinct C&C infrastructure for different targets, and that the operations might have been launched by different teams. Some of the TTPs differ significantly, even though the same toolset was shared. It's worth noting that we observed the following C&C infrastructure overlapping across multiple victim environments. First, we found DEMODEX and Cobalt Strike beacon samples in the same infected machine. The DEMODEX C&C domain pulseathermakf[.]com is used by operator of Campaign Beta. The Cobalt Strike beacon C&C cloudlibraries[.]global[.]ssl[.]fastly[.]net (with the sample downloaded from the C&C hxxp://103.159.133[.]205/lib3.cab) and the post-exploitation activity is linked to TrillClient attack chains, which involve the Hemigate, SparrowDoor, and CrowDoor toolsets. Next, we found that the DEMODEX C&C domain pulseathermakf[.]com has been used to target a Southeast Asian government agency for several years. However, on August 28, 2024, we detected a network connection to pulseathermakf[.]com from a compromised server belonging to a Southeast Asian telecommunications company (Campaign Beta). We speculate that the attacker may have made a mistake while deploying the backdoor. Currently, we observe that the attacker primarily uses the DEMODEX C&C domains www[.]infraredsen[.]com and imap[.]dateupdata[.]com to target multiple Southeast Asian telecom companies. During our investigation of Campaign Beta, we discovered the GHOSTSPIDER backdoor. Subsequently, while tracking the C&C infrastructure related to GHOSTSPIDER, we found that the attacker had also tested GHOSTSPIDER on the Campaign Alpha open directory C&C server 23.81.41[.]166. Figure 16. The certificate (SHA256: b63c82fc37f0e9c586d07b96d70ff802d4b707ffb2d59146cf7d7bb922c52e7e) used by GHOSTPSIDER (Campaign Alpha) download CONCLUSION Earth Estries is one of the most aggressive Chinese APT groups, primarily targeting critical industries such as telecommunications and government sectors. Their notable TTPs include exploiting known vulnerabilities and using widely available shared tools, such as SNAPPYBEE. Earth Estries conducts stealthy attacks that start from edge devices and extend to cloud environments, making detection challenging. They employ various methods to establish operational networks that effectively conceal their cyber espionage activities, demonstrating a high level of sophistication in their approach to infiltrating and monitoring sensitive targets. It is crucial for organizations and their security teams to remain vigilant and proactively strengthen their cybersecurity defenses against cyberespionage campaigns. Through technologies like Trend Vision One™, security practitioners can visualize all organizational components from a single platform, enabling them to monitor and track tools, behaviors, and payloads as they navigate their organization's networks, systems, and infrastructure, while simultaneously detecting and blocking threats as early in the attack or infection process as possible. TREND MICRO VISION ONE THREAT INTELLIGENCE To stay ahead of evolving threats, Trend Micro customers can access a range of Intelligence Reports and Threat Insights within Trend Micro Vision One. Threat Insights helps customers stay ahead of cyber threats before they happen and better prepared for emerging threats. It offers comprehensive information on threat actors, their malicious activities, and the techniques they use. By leveraging this intelligence, customers can take proactive steps to protect their environments, mitigate risks, and respond effectively to threats. Trend Micro Vision One Intelligence Reports App [IOC Sweeping] * Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions Trend Micro Vision One Threat Insights App * Threat Actors: Earth Estries * Emerging Threats: Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions HUNTING QUERIES Trend Micro Vision One Search App Vision One customers can use the Search App to match or hunt the malicious indicators mentioned in this blog post with data in their environment. Hunting DEMODEX Malware > objectFilePath:"PsvchostDLL_X64.dll" OR > objectFilePath:"AesedMemoryBinX64.REG" OR > objectFilePath:"msmp4dec.dll" OR objectFilePath:"wpccfg.dll" OR > objectFilePath:"dumpfiskfss.sys" OR > objectFilePath:"SstpCfs.dll" More hunting queries are available for Vision One customers with Threat Insights Entitlement enabled. YARA RULES Download the YARA rules here. INDICATORS OF COMPROMISE Download the list of IOCs here. This IOC list was last updated on October 31, 2024, during which we observed some of IOCs were still used in the ongoing campaigns. This is not a comprehensive list of IOCs, because most of the related components of DEMODEX and GHOSTSPIDER have different file hashes for different endpoints. We will release more IOCs and hunting queries on the Vision One platform. Tags Aktuelle Nachrichten | APT und gezielte Angriffe | Research AUTHORS * Leon M Chang Sr. Threat Researcher * Theo Chen Threat Researcher * Lenart Bermejo Threats Analyst * Ted Lee Threat Researcher Contact Us Subscribe RELATED ARTICLES * Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 * AESDDoS Botnet, Containers, Exposed Docker APIs * Der Security-RückKlick 2024 KW 47 See all articles Überzeugen Sie sich selbst von der einheitlichen Plattform – kostenlos * Fordern Sie die Lizenz für Ihren 30-tägigen Test an * * * * * RESSOURCEN * Blog * Newsroom * Berichte zu Bedrohungen * Partner suchen * * SUPPORT * Support-Portal für Unternehmen * Kontakt * Downloads * Kostenlose Testversionen * * ÜBER TREND * Info * Impressum * Karriere bei Trend Micro * Standorte * Veranstaltungshinweise * Trust Center * Hauptniederlassung DACH Trend Micro - Germany (DE) Parkring 29 85748 Garching Deutschland Telefon: +49 (0)89 8393 29700 Land/Region auswählen Deutschland, Österreich, Schweiz expand_more close NORD-, MITTEL- UND SÜDAMERIKA * USA * Brasilien * Kanada * Mexiko NAHER OSTEN UND AFRIKA * Südafrika * Naher Osten und Nordafrika EUROPA * Belgien (België) * Tschechische Republik * Dänemark * Deutschland, Österreich, Schweiz * Spanien * Frankreich * Irland * Italien * Niederlande * Norwegen (Norge) * Polen (Polska) * Finnland (Suomi) * Schweden (Sverige) * Türkei (Türkiye) * Vereinigtes Königreich ASIEN-PAZIFIK * Australien * Центральная Азия (Mittelasien) * Hongkong (Englisch) * Hongkong (香港 (中文)) * Indien (भारत गणराज्य) * Indonesien * Japan (日本) * Südkorea (대한민국) * Malaysia * Монголия (Mongolei) und Грузия (Georgien) * Neuseeland * Philippinen * Singapur * Taiwan (台灣) * ประเทศไทย (Thailand) * Vietnam Datenschutz | Rechtliches | Sitemap Copyright ©2024 Trend Micro Incorporated. Alle Rechte vorbehalten Copyright ©2024 Trend Micro Incorporated. Alle Rechte vorbehalten sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk This website uses cookies for website functionality, traffic analytics, personalization, social media functionality and advertising. Our Cookie Notice provides more information and explains how to amend your cookie settings.Learn more Cookies Settings Accept ✓ Danke für das Teilen! AddToAny Mehr… word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 BDOW!