Threat Advisory

APT32 Exploits GitHub Repositories Delivering Malware to Enterprises

Threat: Malicious Campaign
Threat Actor Name: APT32
Threat Actor Type: State-Sponsored
Targeted Region: Global
Alias: G0050, Ocean Buffalo, Bismuth/Canvas Cyclone, Hive0013, Tin Woodlawn, Scarlet Ioke, ATK17, Woodlawn, APT-C-00, SectorF01, Lotus Bane, Pond Loach, Cobalt Kitty, SeaLotus
Threat Actor Region: Vietnam
Targeted Sector: Technology & IT
Criticality: High
[subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

An attack has been uncovered, involving the poisoning of a widely used cybersecurity tool distributed through GitHub. The malicious campaign targeted Chinese researchers by embedding a Trojan within an open-source tool commonly utilized by the security community. This attack aimed at compromising the identities and data of cybersecurity professionals, highlighting the increasing use of advanced techniques to exploit trusted platforms. This campaign has been identified as the Southeast Asian APT group, OceanLotus APT32, known for their highly targeted operations and malicious campaigns.[/subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

An attack has been uncovered, involving the poisoning of a widely used cybersecurity tool distributed through GitHub. The malicious campaign targeted Chinese researchers by embedding a Trojan within an open-source tool commonly utilized by the security community. This attack aimed at compromising the identities and data of cybersecurity professionals, highlighting the increasing use of advanced techniques to exploit trusted platforms. This campaign has been identified as the Southeast Asian APT group, OceanLotus APT32, known for their highly targeted operations and malicious campaigns.[emaillocker id="1283"]

The attack was carried out by using GitHub to distribute a malicious Cobalt Strike exploit plugin, which was embedded in Visual Studio project files. Upon compilation of the project, a malicious .suo file was triggered, executing the Trojan automatically. This technique, which utilizes Visual Studio’s automatic loading and execution of .suo files, marks a new method of attack that is difficult to detect, as the malicious code is quickly overwritten and erased after execution. The injected Trojan deployed a variety of malicious components, including executables and DLL files, and established persistence through registry modifications. The attack also utilized the DLL hollowing technique, commonly associated with OceanLotus, and communicated with a foreign note-taking platform to evade detection. The attack leveraged C2 communication to send and receive commands, ensuring that the attackers could maintain control over the infected systems.

This highlights the evolving tactics of APT groups, with OceanLotus leveraging novel methods to target cybersecurity professionals. The strategic use of GitHub for tool poisoning and the manipulation of Visual Studio project files represents an advanced and highly targeted operation. Given the widespread nature of the attack and the evasion techniques used, organizations within the cybersecurity industry should exercise heightened vigilance and review their security protocols for any indicators of compromise. Furthermore, it is essential to monitor potential indicators associated with this attack, including suspicious C2 traffic and abnormal system behaviors related to the files and registry entries identified.

 

THREAT PROFILE:

Tactic Technique Id Technique
Initial Access T1566 Phishing
Execution T1059 Command and Scripting Interpreter
T1204 User Execution
Persistence T1547 Boot or Logon Autostart Execution
Privilege Escalation T1068 Exploitation for Privilege Escalation
Defense Evasion T1027 Obfuscated Files or Information
T1036 Masquerading
Collection T1056 Input Capture
Command and Control T1071 Application Layer Protocol
T1102 Web Service
Exfiltration T1041 Exfiltration Over C2 Channel
 Impact T1485 Data Destruction

 

REFERENCES:

The following reports contain further technical details:

[/emaillocker]
crossmenu