Trend Micro researchers Nick Dai, Ted Lee, and Vickie Su wrote in a report published last week,” The group attempted to access some internal documents (such as flight schedules and financial plan documents) as well as personal information on the compromised hosts (such as search histories).”

Since July 2020, the transportation industry and government agencies related to the sector have been the targets of a sophisticated and well-equipped cyber espionage group in what appears to be yet another uptick in malicious activities that are “just the tip of the iceberg.”

Earth Centaur also known as Pirate Panda and Tropic Trooper is a long-running threat group focused on information theft and espionage that has led targeted campaigns against Taiwanese government, healthcare, transportation and high-tech industries dating back to 2011.

The researchers reported that, “The group understands how to circumvent security settings and continue operating unhindered. The use of open-source frameworks also allows the group to efficiently develop new backdoor variants.”

In May 2020, the operators were seen fine-tuning their attack strategies with new behaviours by deploying a USB trojan dubbed USBFerry to attack physically isolated networks belonging to government institutions and military entities in Taiwan as well as the Philippines in an attempt to syphon sensitive data via removable flash drives.

Trend Micro’s most recent multi-stage intrusion sequence involves the group exploiting vulnerable Internet Information Services (IIS) servers and Exchange server flaws as entry points to install a web shell, which is then used to deliver a.NET-based Nerapack loader and a first-stage backdoor known as Quasar on the compromised system.

The attackers then drop an arsenal of second-stage implants such as ChiserClient, SmileSvr, ChiserClient, HTShell, and bespoke versions of Lilith RAT and Gh0st RAT depending on the victim to retrieve additional instructions from a remote server, download additional payloads, perform file operations, and execute arbitrary code.

Finally the researchers concluded that ,”The group is capable of mapping their target’s network infrastructure and circumventing firewalls . It employs backdoors with varying protocols that are deployed based on the victim. It can also create customised tools to avoid security monitoring in various environments and it exploits vulnerable websites and uses them as [command-and-control] servers.”

–-For more Cyber security news in crisp content . Please follow our site via twitter handle @cyberworkx1, Linkedin handle @linkedin

Indicator Of Compromise

Hashes

Loaders - Trojan.MSIL.NERAPACK
12425edb2c50eac79f06bf228cb2dd77bb1e847c4c4a2049c91e0c5b345df5f2
321febf2bc5603b58628e3a82fb063027bf175252a3b30869eccb90a78e59582
3ad24a438b9a67e4eff7ca7d34b06d5efc24b824e3e346488d534532faa619da
dd1afc083b7d82444fcec99e01e8293d51f744201cb968346ec334fb5dd32495
e488f0015f14a0eff4b756d10f252aa419bc960050a53cc04699d5cc8df86c8a
6b1b231a7d190651f8c89072e2514aade288dfe6bd87ea62171b6ecffe13d63e
e4a15537f767332a7ed08009f4e0c5a7b65e8cbd468eb81e3e20dc8dfc36aeed
a64e0c21494811ededf5d8af41b00937c1d5787d63dfcc399a7f32c19a553c99

Backdoors - Backdoor.Win64.CHISERCLIENT
ea2264f56ba315c4db49d06cce12365875502686f8f748570cb5a99cb213f008
182f07a00b93a00fae17b33fbfc25931afeddd80f075f241060b4338a49cd5cc
2167855743b9e488ce514c80f246fd5d0973a4296cb565f95517fa1dcfee8f74

Trojan.Win32.SMILESVRDRP
c6cac51035ef7df22c8ff3b5ba204721cdae97bc4728b0de68db1358c0c04035

Backdoor.Win32.SMILESVR
c6f17d39905d2006020c326c13bb514a66bccc5a42d533aade00e09456ca5dec
97e9bf8032e11bb618a77fbe92489e972b0c92e2e30b26f594f6129ee1cec987
507b0280105da31739159703e418e3d1b1e6e6817362bf69e2da3c0b305af605
819afbdc46b3b8f3e4b71e64c48df14ce886a273ce3c93d7a402f4760405b1a4

Backdoor.Win64.LILITH
b3c31192048576591a52bc025e82286d7d32429c2f0991e68d801555b2d74c65

Backdoor.Win32.GH0ST
996aa9c937b610efd1ab5c0ab173fc9fa78a70b423a193c3e2b505519bde7807
7e72ee1052b018250810e41ac01065ebd833293ecfc363415b7d19dd31734d49

Hacking tools
HackTool.MSIL.LOGKILLER
b914087ac90f8aa782ef4c22cee9c458f7bdfc3d37278327aa7e1442011f0e4a

HackTool.Win64.FRP
7ca64c811008e34b5dbb7538fa4bed84c1678ed9813e665071dc0ad0def5b74b

--------------------------------------------------------------------

C&C Servers

lastest[.]ctotw[.]tw:443
infos[.]friendship[.]tw:80
citilink[.]dsmtp[.]com:443
flight[.]goldentop[.]tw:80
cart[.]ns02[.]us
webadmin[.]mirrorstorage[.]org:443
api01[.]lflinkup[.]net:80
portal[.]blueraymax[.]com:80
ca[.]threatiy[.]com:443
cb[.]threatiy[.]com:8443
cc[.]threatiy[.]com:8080
193[.]42[.]40[.]126
157[.]119[.]234[.]100
158[.]247[.]199[.]191
45[.]77[.]214[.]244
195[.]123[.]221[.]7:8080

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s