Dark Pink APT Group Targets Governments and Military in APAC Region

0
234
Dark Pink APT Group Targets Governments and Military in APAC Region


Dark Pink APT Group Targets Governments and Military in APAC Region

Government and army organizations within the Asia-Pacific area are being focused by a beforehand unknown superior persistent menace (APT) actor, per the newest analysis carried out by Albert Priego of Group-IB

Singapore-headquartered Group-IB, in a report shared with The Hacker News, mentioned it is monitoring the continued marketing campaign underneath the title Dark Pink and attributed seven profitable assaults to the adversarial collective between June and December 2022.

The bulk of the assaults have singled out army our bodies, authorities ministries and companies, and non secular and non-profit organizations in Cambodia, Indonesia, Malaysia, Philippines, Vietnam, and Bosnia and Herzegovina, with one unsuccessful intrusion reported in opposition to an unnamed European state improvement physique primarily based in Vietnam.

The menace actor is estimated to have commenced its operations method again in mid-2021, though the assaults ramped up solely a yr later utilizing a never-before-seen customized toolkit designed to plunder worthwhile data from compromised networks.

“Dark Pink APT’s main objectives are to conduct company espionage, steal paperwork, seize the sound from the microphones of contaminated units, and exfiltrate knowledge from messengers,” Group-IB researcher Andrey Polovinkin mentioned, describing the exercise as a “extremely advanced APT marketing campaign launched by seasoned menace actors.”

Group-IB advised The Hacker News that there’s not sufficient knowledge to explicitly attribute the menace actor to a selected nation, however famous that it is doubtless of Asia-Pacific origin given the geolocation of recognized victims.

In addition to its refined malware arsenal, the group has been noticed leveraging spear-phishing emails to provoke its assaults in addition to Telegram API for command-and-control (C2) communications.

Also notable is the usage of a single GitHub account for internet hosting malicious modules and which has been lively since May 2021, suggesting that Dark Pink has been capable of function with out getting detected for over 1.5 years.

The Dark Pink marketing campaign additional stands out for using a number of an infection chains, whereby the phishing messages include a hyperlink to a booby-trapped ISO picture file to activate the malware deployment course of. In one occasion, the adversary posed as a candidate making use of for a PR internship.

It’s additionally suspected that the hacking crew could also be trawling job boards in an effort to tailor their messages and improve the probability of success of their social engineering assaults.

The final purpose is to deploy TelePowerBot and KamiKakaBot, that are able to executing instructions despatched by way of an actor-controlled Telegram bot, along with utilizing bespoke instruments like Ctealer and Cucky to siphon credentials and cookies from internet browsers.

While Ctealer is written in C/C++, Cucky is a .NET program. Another customized malware is ZMsg, a .NET-based software that enables Dark Pink to reap messages despatched by way of messaging apps equivalent to Telegram, Viver, and Zalo.

An alternate kill chain recognized by Group-IB makes use of a decoy doc included within the ISO file to retrieve a rogue macro-enabled template from GitHub, which, in flip, harbors TelePowerBot, a PowerShell script malware.

That’s not all. A 3rd methodology noticed just lately in December 2022 sees the launch of KamiKakaBot, a .NET model of TelePowerBot, with the assistance of an XML file containing an MSBuild challenge that is positioned on the finish of a Word doc in encrypted view. The Word file is current in an ISO picture despatched to the sufferer in a spear-phishing e mail.

“The menace actors behind this wave of assaults have been capable of craft their instruments in a number of programming languages, giving them flexibility as they tried to breach protection infrastructure and achieve persistence on victims’ networks,” Polovinkin defined.

A profitable compromise is adopted by reconnaissance, lateral motion, and knowledge exfiltration actions, with the actor additionally utilizing Dropbox and e mail in some instances to transmit information of curiosity. The malware, moreover recording microphone audio by way of the Windows Steps Recorder software, is tasked with taking screenshots and infecting hooked up USB disks to propagate TelePowerBot.

“The use of an virtually totally customized toolkit, superior evasion methods, the menace actors’ skill to remodel their malware to make sure most effectiveness, and the profile of the focused organizations display the menace that this explicit group poses,” Polovinkin mentioned.

Found this text fascinating? Follow us on Twitter and LinkedIn to learn extra unique content material we put up.

LEAVE A REPLY

Please enter your comment!
Please enter your name here