Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry

May 6, 2023Rabbi LakshmananAdvanced Persistent Threats

Target gambling industry

Advanced Persistent Threat (APT) actors known as dragon breath By employing a new DLL sideloading mechanism, we have observed adding another layer of complexity to the attack.

“This attack is based on a traditional sideloading attack consisting of a clean application, a malicious loader, and an encrypted payload, with various modifications to these components over time.” Sophos researcher Gabor Szappanos said.

“The latest campaign has a twist where the first stage clean application “sides” loads the second clean application and executes it automatically. A second clean application sideloads a malicious loader DLL. A malicious loader DLL is then executed. final payload. ”

Operation Dragon Breath, also tracked under the names APT-Q-27 and Golden Eye, was first documented by QiAnXin in 2020 to trick users into downloading a Trojanized Windows installer for Telegram. Details of a watering hole campaign designed to

cyber security

A subsequent campaign detailed by a Chinese cybersecurity firm in May 2022 highlighted the continued use of the Telegram installer as a lure to deploy additional payloads such as the gh0st RAT.

Dragon Breath is also said to be part of a larger organization called the Miuuti Group. The attackers are characterized as “Chinese-speaking” organizations targeting the online gaming and gambling industry, joining other clusters of Chinese activity such as Dragon Castling and Dragon Dance. , Earth Berberoka.

double clean app technique

According to Sophos, the double-dip DLL sideloading strategy has been used in attacks targeting users in the Philippines, Japan, Taiwan, Singapore, Hong Kong, and China. These intrusion attempts were ultimately unsuccessful.

The first vector is a fake website that hosts an installer for Telegram that, when opened, creates a desktop shortcut designed to load a malicious component in the background on startup, while also tricking the victim into opening the Telegram app. display the user interface of

Additionally, the attackers are believed to have created multiple variations of the scheme to start the attack chain using modified installers of other apps such as LetsVPN and WhatsApp.

upcoming webinars

Learn how to stop ransomware with real-time protection

Join our webinar to learn how real-time MFA and service account protection can stop ransomware attacks.

Save my seat!

The next stage uses a second clean application as an intermediate to evade detection and load the final payload via a malicious DLL.

The payload acts as a backdoor capable of downloading and executing files, clearing event logs, extracting and setting clipboard contents, executing arbitrary commands, and stealing cryptocurrencies from the MetaMask wallet extension for Google Chrome. .

“DLL sideloading, first observed in Windows products in 2010, is widespread across multiple platforms and continues to be an effective and attractive tactic for attackers,” said Szappanos.

“This double-clean app technology employed by the Dragon Breath Group, aimed at a user sector that has hitherto been under-scrutinized by security researchers (online gambling), represents the continued vigor of this approach. .”

Did you find this article interesting?Please follow us twitter and LinkedIn to read more exclusive content we post.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *