Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/26/2020
08:40 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

China-Based Threat Group Launches Widespread Malicious Campaign

The motives behind the attacks remain unclear, but likely triggers include the ongoing trade war between the US and China and the unfolding COVID-19 pandemic.

APT41, a prolific advanced persistent threat group believed to be working on behalf of the Chinese government, has sharply ramped up its activities in recent months after a relative lull.

Researchers from FireEye who have been tracking the activity said APT41 attacked as many as 75 of its customers between January 20 and March 11 alone.

The targeted organizations are scattered across 20 countries, including the US, UK, Canada, Australia, France, Japan, and India. Organizations from nearly 20 sectors have been impacted, including those in the government, defense, banking, healthcare, pharmaceutical, and telecommunication sectors.

Though only a handful of the attacks resulted in an actual security compromise, FireEye described APT41's activity as one of the broadest malicious campaigns ever by a Chinese threat actor in recent years.

Chris Glyer, chief security architect at FireEye, says the reason for APT41's sudden burst of activity is unclear. Based on FireEye's current visibility, the attacks appear to be targeted, but it is hard to ascribe a specific motive or intent behind APT41's behavior, he says.

But likely triggers include the ongoing trade war between the US and China and the unfolding COVID-19 pandemic. It is possible that these events are driving China on a quest for intelligence on a variety of topics, including trade, travel, communications, manufacturing, research, and international relations.

"The most likely explanation for the broad targeting set is to enable both current as well as future potential collection requirements that would enable APT41 to complete their mission objectives quickly," Glyer says.

In several of the attacks, the threat actors attempted to exploit a previously known remote code execution flaw (CVE-2019-19781) in Citrix Application Delivery Controller (ADC) and Citrix Gateway devices. The flaw was first disclosed last December, and exploits for it became available this January. 

The flaw evoked considerable concern among security researchers because it impacted a Citrix technology that is widely deployed in enterprise settings and also because of how trivial it was to exploit. The concerns were exacerbated by the fact that exploits for the flaw became available before Citrix had a patch for it. Though Citrix and others, including the DHS's Cybersecurity and Infrastructure Security Agency (CISA), urged organizations to patch or otherwise protect against the flaw as soon as possible, many systems are believed to still be unpatched and vulnerable to the bug.

Dangerous Vulnerabilities
CVE-2019-19781 enables an attacker to execute arbitrary code on a vulnerable device, Glyer says. One of the worst-case scenarios would be an attacker compromising an ADC device, accessing credentials stored in the device, and then using the credentials and network access to move laterally and escalate privileges within a victim's internal network, he says.

According to Glyer, APT41 appears to have managed to successfully exploit the Citrix flaw at just one of the several organizations it targeted in its newest campaign.

In recent weeks FireEye researchers observed the China-based threat actor attempting to exploit a zero-day vulnerability [CVE-2020-10189] in Zoho ManageEngine. That flaw was disclosed earlier this month, and a proof-of-concept for exploiting it is already publicly available. FireEye counted attacks attempting to exploit the Zoho bug at more than a dozen of its customers. At least five of them were subsequently compromised and had malware installed on their systems.

In all of the exploitation attempts that FireEye observed, APT41 actors only leveraged publicly available tools, such as Cobalt Strike and Meterpreter, FireEye said in its report this week. In 2020, APT41 has emerged as one of the most active threat groups, Glyer says.

"APT41 is one of the most prolific and capable threat actors that we track," he says. "Organizations should take the information provided in the blog and evaluate whether they might have been targeted by APT41."

FireEye has previously described APT41 as a dual cybercrime and espionage group. Its espionage operations on behalf of the government in China have previously focused on healthcare, high tech, and the telecommunications sectors. APT41's modus operandi has typically been to break in, establish, and maintain strategic access on victim networks. The group's financially motivated cybercrime activities, on the other hand, have been purely for personal gain, FireEye said.

 Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "What Should I Do If Someone Is Impersonating My Company in a Phishing Campaign?"

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24119
PUBLISHED: 2021-05-14
A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect.
CVE-2020-27833
PUBLISHED: 2021-05-14
A Zip Slip vulnerability was found in the oc binary in openshift-clients where an arbitrary file write is achieved by using a specially crafted raw container image (.tar file) which contains symbolic links. The vulnerability is limited to the command `oc image extract`. If a symbolic link is first c...
CVE-2021-22866
PUBLISHED: 2021-05-14
A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App o...
CVE-2021-27737
PUBLISHED: 2021-05-14
Apache Traffic Server 9.0.0 is vulnerable to a remote DOS attack on the experimental Slicer plugin.
CVE-2021-32054
PUBLISHED: 2021-05-14
Firely/Incendi Spark before 1.5.5-r4 lacks Content-Disposition headers in certain situations, which may cause crafted files to be delivered to clients such that they are rendered directly in a victim's web browser.