Intelligence Brief Nation-State Hackers Breach Middle East Telecom Providers in Cyber Espionage Attack.
Julian Strong MSc MBCS MIScT AMIET
Experienced Railway Signalling DPE/SPE/CEM/CRE inc. CSM-RA. High Speed Lines, Mainline rail and Mass Transit Systems.
Date: 24th March 2023?
Location: China, Middle East, Southeast Asia, Europe, Africa???
Parties involved: China, Middle East, Southeast Asia, Europe, Africa Telecom Providers, Sentinel Labs, Gallium, Mimikatz, APT10, APT27, APT41???
What happened: Middle East telecom providers have been targeted during the start of 2023, the attack has been attributed to a long-term Chinese campaign termed ‘Operation Soft Cell'. Researchers from SentinelOne and QGroup identified that the initial attack phase involved infiltrating an internet-facing Microsoft Exchange and then deploying web shells to implement command executions. Once confirmed successful, the attack then moves into its next phase, where the threat actor undertakes a mixture of reconnaissance, credential theft, lateral movement, and data exfiltration. Operation Soft Cell is unusual in that it has been active and undertaking attacks on telecom providers since 2012, much longer than a typical targeted attack which would have a limited useful lifespan. Microsoft has also been tracking Operation Soft Cell, the threat actors themselves, issuing the tag Gallium to the project. Microsoft identified that they used tools such as Mimikatz, which allowed the threat actor to obtain credentials and then use these to laterally move across the target network. Mimikatz has since been superseded by ‘mim221’, which contains new anti-detection features making detecting and tracing the threat actor more difficult. Companies in Southeast Asia, Europe, Africa, and the Middle East were also targeted using a backdoor that was known as ‘Pingpull’. ‘Pingpull’ was extremely difficult to detect and was used to undertake acts of espionage. However, despite the nature of the attacks, they failed to breach the system with attacks being detected and blocked before they could be deployed onto the target networks. Research undertaken by Markus Neis of Swisscom indicates that the threat actors are actually multiple Chinese nation-state actors such as APT10 (aka Bronze Riverside, Potassium, or Stone Panda), APT27 (aka Bronze Union, Emissary Panda, or Lucky Mouse), and APT41 (aka Barium, Bronze Atlas, or Wicked Panda).
Analysis:?
领英推荐
Recommendations:
This article was written by Richard Flood & Julian Strong.
Sources:
Operation Tainted Love Chinese APTs Target Telcos in New Attacks, Sentinel Labs, March 2023, https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/?