Skip to content
  • Home
  • Science and Technology
  • Edge computing and IoT
  • Cybersecurity
  • Information Technology
  • Artificial Intelligence
  • Advanced Technologies

Sharp Panda Using New Soul Framework Version to Target Southeast Asian Governments

Posted on March 8, 2023March 9, 2023 By Jerry Simmons

[ad_1]

Mar 08, 2023Ravie LakshmananAdvanced Persistent Threat

Sharp Panda Hackers

High-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a Chinese threat actor known as Sharp Panda since late last year.

The intrusions are characterized by the use of a new version of the Soul modular framework, marking a departure from the group’s attack chains observed in 2021.

Israeli cybersecurity company Check Point said the “long-running” activities have historically singled out countries such as Vietnam, Thailand, and Indonesia. Sharp Panda was first documented by the firm in June 2021, describing it as a “highly-organized operation that placed significant effort into remaining under the radar.”

Interestingly, the use of the Soul backdoor was detailed by Broadcom’s Symantec in October 2021 in connection to an unattributed espionage operation targeting defense, healthcare, and ICT sectors in Southeast Asia.

The implant’s origins, according to research published by Fortinet FortiGuard Labs in February 2022, date as far back as October 2017, with the malware repurposing code from Gh0st RAT and other publicly available tools.

The attack chain detailed by Check Point begins with a spear-phishing email containing a lure document that leverages the Royal Road Rich Text Format (RTF) weaponizer to drop a downloader by exploiting one of several vulnerabilities in the Microsoft Equation Editor.

Soul Hacker Framework

The downloader, in turn, is designed to retrieve a loader known as SoulSearcher from a geofenced command-and-control (C&C) server that only responds to requests originating from IP addresses corresponding to the targeted countries.

The loader is then responsible for downloading, decrypting, and executing the Soul backdoor and its other components, thereby enabling the adversary to harvest a wide range of information.

“The Soul main module is responsible for communicating with the C&C server and its primary purpose is to receive and load in memory additional modules,” Check Point said.

Discover the Latest Malware Evasion Tactics and Prevention Strategies

Ready to bust the 9 most dangerous myths about file-based attacks? Join our upcoming webinar and become a hero in the fight against patient zero infections and zero-day security events!

RESERVE YOUR SEAT

“Interestingly, the backdoor configuration contains a ‘radio silence’-like feature, where the actors can specify specific hours in a week when the backdoor is not allowed to communicate with the C&C server.”

The findings are yet another indication of the tool sharing that’s prevalent among Chinese advanced persistent threat (APT) groups to facilitate intelligence gathering.

“While the Soul framework has been in use since at least 2017, the threat actors behind it have been constantly updating and refining its architecture and capabilities,” the company said.

It further noted that the campaign is likely “staged by advanced Chinese-backed threat actors, whose other tools, capabilities and position within the broader network of espionage activities are yet to be explored.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Source_link

Cybersecurity

Post navigation

Previous Post: CISA’s KEV Catalog Updated with 3 New Flaws Threatening IT Management Systems
Next Post: Get 1 TB of secure cloud storage for just $140

Related Posts

Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort Cybersecurity
QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates Cybersecurity
Google Takes Down 50,000 Instances of Pro-Chinese DRAGONBRIDGE Influence Operation Cybersecurity
A Hackers Pot of Gold: Your MSP’s Data Cybersecurity
Samsung Galaxy Store App Found Vulnerable to Sneaky App Installs and Fraud Cybersecurity
Git Users Urged to Update Software to Prevent Remote Code Execution Attacks Cybersecurity

Archives

  • March 2023
  • February 2023
  • January 2023

Categories

  • Advanced Technologies
  • Artificial Intelligence
  • Cybersecurity
  • Edge computing and IoT
  • Information Technology
  • Science and Technology

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access
  • Why cars running on e-fuel can’t replace EVs
  • Google’s cloud gaming ambitions died with Stadia, exec reveals
  • Wii U memory errors are a new problem for old game consoles
  • Silvergate has collapsed – The Verge

Recent Comments

    AndNews.

    Powered by PressBook Masonry Dark