3 Chinese-Linked Clusters Drive Cyberattacks in SE Asia

SeniorTechInfo
2 Min Read

The Rise of Cyber Espionage: China’s Crimson Palace Targets Southeast Asia

Sep 10, 2024Ravie LakshmananMalware / Cyber Espionage

A new wave of cyber espionage activities has emerged in Southeast Asia, with China’s Crimson Palace targeting government organizations in the region. This state-sponsored operation involves three threat activity clusters – Cluster Alpha, Cluster Bravo, and Cluster Charlie, expanding the scope of the espionage effort.

Sophos, a leading cybersecurity firm, has been monitoring these attacks, revealing that the threat actors have been using compromised networks to deliver malicious tools and malware. The attackers are exploiting trusted access points to infiltrate systems and carry out their operations.

The attacks involve the use of compromised systems as command-and-control relay points, as well as the deployment of malware on compromised Microsoft Exchange Servers. The tactics employed by the threat actors highlight their focus on maintaining access to target networks and bypassing security measures.

Cluster Bravo, also known as Unfading Sea Haze, has been particularly active, targeting multiple organizations in the region. The attacks orchestrated by Cluster Charlie, or Earth Longzhi, involve the use of sophisticated C2 frameworks like Cobalt Strike and XieBroC2 to carry out post-exploitation activities.

Furthermore, the threat actors have been leveraging techniques like DLL hijacking and deploying tools like RealBlindingEDR and Alcatraz to evade detection and gather sensitive information. The arsenal of malware includes a keylogger named TattleTale, capable of collecting browser data and sensitive information.

The ongoing cyber espionage campaign demonstrates the threat actors’ persistence in refining their tactics and tools. Their ability to adapt to security measures and combine custom-developed tools with open-source software poses a significant challenge for defenders.

As the threat landscape evolves, organizations must remain vigilant against sophisticated cyber attacks. Stay informed about the latest cybersecurity trends and developments by following us on Twitter and LinkedIn for more exclusive content.

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *