Ace Breaking News

BREAKING CHINA: Hackers Targeted Dozens of Industrial Enterprises & Public Institutions in Afghanistan & Europe

This is our daily post that is shared across Twitter & Telegram and published first on here with Kindness & Love XX on

#AceNewsRoom With ‘Kindness & Wisdom’ Aug.09, 2022 @acebreakingnews

Ace News Room Cutting Floor 09/08/2022

Follow Our Breaking & Daily News Here As It Happens:

#AceBreakingNews – Over a dozen military-industrial complex enterprises and public institutions in Afghanistan and Europe have come under a wave of targeted attacks since January 2022 to steal confidential data by simultaneously making use of six different backdoors.

Chinese Hackers

Russian cybersecurity firm Kaspersky attributed the attacks “with a high degree of confidence” to a China-linked threat actor tracked by Proofpoint as TA428, citing overlaps in tactics, techniques, and procedures (TTPs).

TA428, also tracked under the names Bronze Dudley, Temp.Hex, and Vicious Panda, has a history of striking entities in Ukraine, Russia, Belarus, and Mongolia. It’s believed to share connections with another hacking group called Mustang Panda (aka Bronze President).

Targets of the latest cyber espionage campaign included industrial plants, design bureaus and research institutes, government agencies, ministries and departments in several East European countries and Afghanistan.

Attack chains entail penetrating the enterprise IT networks using carefully crafted phishing emails, including some that referenced non-public information pertaining to the organizations, to trick recipients into opening rogue Microsoft Word documents.

Chinese Hackers

These decoy files come with exploits for a 2017 memory corruption flaw in the Equation Editor component (CVE-2017-11882) that could lead to the execution of arbitrary code in the affected systems, ultimately leading to the deployment of a backdoor called PortDoor.

PortDoor was notably employed in spear-phishing attacks mounted by Chinese state-sponsored hackers in April 2021 to break into the systems of a defense contractor that designs submarines for the Russian Navy.

Chinese Hackers

The use of six different implants, Kaspersky noted, is likely an attempt on the part of the threat actors to establish redundant channels for controlling infected hosts should one of them get detected and removed from the networks.

The intrusions culminate with the attacker hijacking the domain controller and gaining complete control of all of the organization’s workstations and servers, leveraging the privileged access to exfiltrate files of interest in the form of compressed ZIP archives to a remote server located in China.

Other backdoors utilized in the attacks include nccTrojanCotx, DNSep, Logtu, and a previously undocumented malware dubbed as CotSam, so named owing to its similarities with Cotx. Each provides extensive functionality for commandeering the systems and harvesting sensitive data.

Also incorporated in the attacks is Ladon, a hacking framework the lateral movement that also enables the adversary to scan for devices in the network as well as exploit security vulnerabilities in them to execute malicious code.

“Spear phishing remains one of the most relevant threats to industrial enterprises and public institutions,” Kaspersky said. “The attackers used primarily known backdoor malware, as well as standard techniques for lateral movement and antivirus solution evasion.”

“At the same time, they were able to penetrate dozens of enterprises and even take control of the entire IT infrastructure, and IT security solutions of some of the organizations attacked.”

The findings arrive a little over two months after the Twisted Panda actors were observed targeting research institutes in Russia and Belarus to drop a bare-bones backdoor called Spinner.

#AceNewsDesk report ………..Published: Aug.09: 2022:

Editor says …Sterling Publishing & Media Service Agency is not responsible for the content of external site or from any reports, posts or links, and can also be found here on Telegram: and all wordpress and live posts and links here: and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com