www.recordedfuture.com Open in urlscan Pro
104.18.43.111  Public Scan

URL: https://www.recordedfuture.com/redjuliett-intensifies-taiwanese-cyber-espionage-via-network-perimeter
Submission: On July 01 via api from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept
 * Blog
 * Careers
 * Contact Us
 * Login
 * ENDEJPKO
   
   EN
   

 * Platform
 * Solutions
 * Products
 * Services
 * Research
 * Resources
 * Company

Get a demo

Book a free demo



Research (Insikt)


CHINESE STATE-SPONSORED REDJULIETT INTENSIFIES TAIWANESE CYBER ESPIONAGE VIA
NETWORK PERIMETER EXPLOITATION

Posted: 24th June 2024
By: Insikt Group®


From November 2023 to April 2024, Insikt Group identified cyber-espionage
activities conducted by RedJuliett, a likely Chinese state-sponsored group,
primarily targeting government, academic, technology, and diplomatic
organizations in Taiwan. RedJuliett exploited known vulnerabilities in network
edge devices such as firewalls, virtual private networks (VPNs), and load
balancers for initial access. The group likely operates from Fuzhou, China,
aligning with its persistent targeting of Taiwan. RedJuliett’s activities likely
aim to support Beijing's intelligence collection on Taiwan’s economic and
diplomatic relations, as well as critical technology development.



Chinese State-Sponsored RedJuliett Intensifies Cyber Espionage Against Taiwanese
Government, Academic, and Technology Sectors

RedJuliett’s focus on targeting Taiwanese entities aligns with the group’s past
activity. Insikt Group also observed RedJuliett expand its operations to
compromise organizations in Hong Kong, Malaysia, Laos, South Korea, the United
States, Djibouti, Kenya, and Rwanda.

In addition to targeting vulnerabilities in internet-facing devices, RedJuliett
also used structured query language (SQL) injection and directory traversal
exploits against web and SQL applications. Organizations should complement
routine patching with defense-in-depth strategies focused on detecting
post-exploitation persistence, discovery, and lateral movement activity to
counter these threats. Organizations should also regularly audit internet-facing
devices and reduce their attack surface where possible. RedJuliett closely
overlaps with public reporting under the aliases Flax Typhoon and Ethereal
Panda.



Key Findings

 * Victim Organizations: RedJuliett compromised 24 organizations, including
   government organizations in Taiwan, Laos, Kenya, and Rwanda. The group also
   conducted network reconnaissance or attempted exploitation against over 70
   academic, government, think tank, and technology organizations in Taiwan, as
   well as multiple de facto embassies operating on the island.
 * Exploitation Techniques: RedJuliett created a SoftEther VPN bridge or client
   in victim networks. Additionally, the group conducted reconnaissance and
   attempted exploitation activity using Acunetix Web Application Security
   Scanners. RedJuliett also attempted SQL injection and directory traversal
   exploits against web and SQL applications. Post-exploitation, the group used
   open-source web shells and exploited an elevation of privilege vulnerability
   in the Linux operating system.
 * Infrastructure: RedJuliett administers operational infrastructure using
   SoftEther VPN, leveraging both threat actor-controlled leased servers and
   compromised infrastructure belonging to Taiwanese universities.
 * Implications for Taiwan: RedJuliett's activities align with Beijing's
   objectives to gather intelligence on Taiwan’s economic policy, trade, and
   diplomatic relations. The group also targeted multiple critical technology
   companies, highlighting the strategic importance of this sector for Chinese
   state-sponsored threat actors.

Recommendations for Organizations

Organizations likely to be targeted by RedJuliett should adopt the following
measures:

 1. Network Segmentation: Practice network segmentation by isolating
    internet-facing services in a demilitarized zone (DMZ).
 2. Security Monitoring: Ensure security monitoring and detection capabilities
    for all external-facing services and devices. Monitor for follow-on
    activities such as the use of web shells, backdoors, or reverse shells and
    lateral movement within internal networks.
 3. Review Public Guidance: Review public guidance on mitigating common TTPs
    used by Chinese state-sponsored groups and Insikt Group’s report on trends
    and recommendations for mitigating Chinese APT activity more broadly.
 4. Risk-Based Patching: Ensure a risk-based approach for patching
    vulnerabilities, prioritizing high-risk vulnerabilities and those being
    exploited in the wild, as identified by Recorded Future Vulnerability
    Intelligence.
 5. Prioritize RCE Vulnerabilities: Focus on addressing remote code execution
    (RCE) vulnerabilities in popular VPN, mail server, firewall, and
    load-balancing appliances, particularly F5 BIG-IP, Fortinet FortiGate, and
    ZyXEL ZyWALL devices.
 6. Malicious Traffic Analysis: Monitor Malicious Traffic Analysis (MTA) to
    proactively detect and alert on infrastructure communicating with known
    RedJuliett command-and-control (C2) IP addresses.
 7. Monitor Supply Chains: Use Recorded Future Third-Party Intelligence to
    monitor real-time output and identify suspected intrusion activities
    involving key vendors and partners.
 8. Threat Intelligence Extension: Install the Recorded Future Threat
    Intelligence Browser Extension for instant access to threat intelligence
    from any web-based resource, enabling faster alert processing within
    security information and event management (SIEM) and prioritizing
    vulnerabilities for patching.

Insikt Group anticipates that RedJuliett and other Chinese state-sponsored
threat actors will continue to target Taiwan for intelligence-gathering,
focusing on universities, government organizations, think tanks, and technology
companies. Chinese state-sponsored groups are expected to continue their
reconnaissance and exploitation of public-facing devices, a tactic that has
proven effective in scaling their operations to gain initial access to a broad
range of global targets.

To read the entire analysis, click here to download the report as a PDF.


APPENDIX A — INDICATORS OF COMPROMISE

Active RedJuliett servers as of May 21, 2024:
38.147.190[.]192 (since 2024-04-07)
61.238.103[.]155 (since 2024-02-23)
122.10.89[.]230 (since 2024-01-24)
137.220.36[.]87 (since 2024-05-09)
140.120.98[.]115 (since 2023-11-14)
154.197.98[.]3 (since 2023-11-14)
154.197.99[.]202 (since 2023-12-16)
176.119.150[.]92 (since 2024-04-01)

Known RedJuliett SoftEther TLS Certificates (SHA-1 Fingerprint)
7992c0a816246b287d991c4ecf68f2d32e4bca18
5437d0195c31bf7cedc9d90b8cb0074272bc55df
cc1f0cdc131dfafd43f60ff0e6a6089cd03e92f1
2c95b971aa47dc4d94a3c52db74a3de11d9ba658
0cc0ba859981e0c8142a4877f3af99d98dc0b707
9f01fc7cad8cdd8d934e2d2f033d7199a5e96e4a

Domains:
cktime.ooguy[.]com
www.sofeter[.]ml
www.dns361[.]tk







APPENDIX B — MITRE ATT&CK TECHNIQUES

Tactic: Technique ATT&CK Code Resource Development: Acquire Infrastructure:
Virtual Private Server T1583.003 Resource Development: Compromise
Infrastructure: Server T1584 Reconnaissance: Active Scanning: Vulnerability
Scanning T1595.002 Initial Access: Exploit Public-Facing Application T1190
Persistence: External Remote Services T1133 Persistence: Server Software
Component: Web Shell T1505.003 Privilege Escalation: Exploitation for Privilege
Escalation T1068



Related Research (Insikt)

Research (Insikt)


SOMBRES INFLUENCES: RUSSIAN AND IRANIAN INFLUENCE NETWORKS TARGET FRENCH
ELECTIONS

Insikt Group identifies Russian and Iranian influence operations targeting the
French elections, highlighting negligible impact but the need to continue
monitoring.

View Research (Insikt)
Research (Insikt)


危機を乗り越えるには: パリ五輪にとっての多面的な脅威

View Research (Insikt)
Research (Insikt)


RUSSIA-LINKED COPYCOP EXPANDS TO COVER US ELECTIONS, TARGET POLITICAL LEADERS

Discover how the Russia-linked CopyCop network uses AI to influence the 2024 US
elections and target political leaders. Learn more.

View Research (Insikt)


About us

 * Intelligence Cloud
 * Services & Support
 * Research
 * Resources
 * Company

Helpful links

 * Careers
 * Contact Us
 * Get a Demo
 * The Intelligence Graph

--------------------------------------------------------------------------------

Join us online

 * 
 * 
 * 
 * 
 * 

Want to learn more?

Contact us today

Copyright © 2024 Recorded Future, Inc.
 * Security FAQ
 * Cookies
 * Privacy Policy
 * Terms & Conditions