Category: Uncategorized

  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

    China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware


    A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary poisoned Domain Name System (DNS) requests to deliver its signature MgBot backdoor in attacks targeting victims in Türkiye, China, and India.

    The activity, Kaspersky said, was observed between November 2022 and November 2024. It has been linked to a hacking group called Evasive Panda, which is tracked as Bronze Highland, Daggerfly, and StormBamboo. It’s assessed to be active since at least 2012.

    “The group mainly performed adversary-in-the-middle (AitM) attacks on specific victims,” Kaspersky researcher Fatih Şensoy said in a deep-dive analysis. “These included techniques such as dropping loaders into specific locations and storing encrypted parts of the malware on attacker-controlled servers, which were resolved as a response to specific website DNS requests.”

    This is not the first time Evasive Panda’s DNS poisoning capabilities have come to the fore. As far back as April 2023, ESET noted that the threat actor may have either carried out a supply chain compromise or an AitM attack to serve trojanized versions of legitimate applications like Tencent QQ in an attack targeting an international non-governmental organization (NGO) in Mainland China.

    In August 2024, a report from Volexity revealed how the threat actor compromised an unnamed internet service provider (ISP) by means of a DNS poisoning attack to push malicious software updates to targets of interest.

    Cybersecurity

    Evasive Panda is also one of the many China-aligned threat activity clusters that have relied on AitM poisoning for malware distribution. In an analysis last month, ESET said it’s tracking 10 active groups from China that have leveraged the technique for initial access or lateral movement, including LuoYu, BlackTech, TheWizards APT, Blackwood, PlushDaemon, and FontGoblin.

    In the attacks documented by Kaspersky, the threat actor has been found to make use of lures that masquerade as updates for third-party software, such as SohuVA, a video streaming service from the Chinese internet company Sohu. The malicious update is delivered from the domain “p2p.hd.sohu.com[.]cn,” likely indicating a DNS poisoning attack.

    “There is a possibility that the attackers used a DNS poisoning attack to alter the DNS response of p2p.hd.sohu.com[.]cn to an attacker-controlled server’s IP address, while the genuine update module of the SohuVA application tries to update its binaries located in appdata\roaming\shapp\7.0.18.0\package,” Şensoy explained.

    The Russian cybersecurity vendor said it also identified other campaigns in which Evasive Panda utilized a fake updater for Baidu’s iQIYI Video, as well as IObit Smart Defrag and Tencent QQ.

    The attack paves the way for the deployment of an initial loader that’s responsible for launching shellcode that, in turn, fetches an encrypted second-stage shellcode in the form of a PNG image file, again by means of DNS poisoning from the legitimate website dictionary[.]com.

    Evasive Panda is said to have manipulated the IP address associated with dictionary[.]com, causing victim systems to resolve the website to an attacker-controlled IP address based on their geographical location and internet service provider.

    It’s currently not known how the threat actor is poisoning DNS responses. But two possible scenarios are suspected: either the ISPs used by the victims were selectively targeted and compromised to install some kind of a network implant on edge devices, or a router or firewall used by the victims was hacked for this purpose.

    The HTTP request to obtain the second-stage shellcode also contains the current Windows version number. This is likely an attempt on the part of the attackers to target specific operating system versions and adapt their strategy based on the operating system used. It’s worth noting that Evasive Panda has previously leveraged watering hole attacks to distribute an Apple macOS malware codenamed MACMA.

    The exact nature of the second-stage payload is unclear, but Kaspersky’s analysis shows that the first-stage shellcode decrypts and runs the retrieved payload. It’s assessed that the attackers generate a unique encrypted second shellcode file for each victim as a way to bypass detection.

    Cybersecurity

    A crucial aspect of the operations is the use of a secondary loader (“libpython2.4.dll”) that relies on a renamed, older version of “python.exe” to be sideloaded. Once launched, it downloads and decrypts the next-stage malware by reading the contents of a file named “C:\ProgramData\Microsoft\eHome\perf.dat.” This file contains the decrypted payload downloaded from the previous step.

    “It appears that the attacker used a complex process to obtain this stage from a resource, where it was initially XOR-encrypted,” Kaspersky said. “The attacker then decrypted this stage with XOR and subsequently encrypted and saved it to perf.dat using a custom hybrid of Microsoft’s Data Protection Application Programming Interface (DPAPI) and the RC5 algorithm.”

    The use of a custom encryption algorithm is seen as an attempt to complicate analysis by ensuring that the encrypted data can only be decoded on the specific system where the encryption was initially performed and block any efforts to intercept and analyze the malicious payload.

    The decrypted code is an MgBot variant that’s injected by the secondary loader into a legitimate “svchost.exe” process. A modular implant, MgBot, is capable of harvesting files, logging keystrokes, gathering clipboard data, recording audio streams, and stealing credentials from web browsers. This enables the malware to maintain a stealthy presence in compromised systems for long periods of time.

    “The Evasive Panda threat actor has once again showcased its advanced capabilities, evading security measures with new techniques and tools while maintaining long-term persistence in targeted systems,” Kaspersky said.



    Source link

  • Deadly explosion during Friday prayers inside Syrian mosque

    Deadly explosion during Friday prayers inside Syrian mosque


    An explosion has killed at least eight people and injured 18 others during Friday prayers inside a mosque in the Syrian city of Homs, the health ministry has said.

    Pictures from Syria’s state-run news agency, Sana, show the inside of the Imam Ali ibn Abi Talib Mosque with black, scorched walls, smashed windows and blood on the carpet.

    Officials believe that an explosive was detonated inside the building, Sana reports, citing a security source. While authorities are still searching for the perpetrators, jihadist group Saraya Ansar al-Sunnah has claimed responsibility.

    The mosque is in the Wadi al-Dhahab neighbourhood, where most people are part of the Alawite ethnoreligious group.

    Syria’s Foreign Ministry condemned the “terrorist crime”, writing in a statement on X that the “cowardly act is a blatant assault on human and moral values” designed to “undermine the security and stability” of the country.

    Saraya Ansar al-Sunnah, a Sunni extremist group, has said it carried out the attack in collaboration with another unidentified group, using explosives planted at the site.

    The group’s vague origins and opaque affiliations, which came to prominence in June when it claimed responsibility for a deadly church bombing in Damascus, have raised questions about its true links and authenticity.

    Some observers have speculated that it could be a front for Islamic State group (IS) given the similarity in their messaging and type of targets.

    The latest claim follows a months-long lull in Saraya Ansar al-Sunnah’s claimed attacks, which have largely taken the form of alleged targeted killings of minorities and what the group describes as “remnants” of the former Syrian government of Bashar al-Assad.

    The blast comes a year after Syrian rebel forces overthrew Assad, who is Alawite. The sect is an offshoot of Shia Islam whose members make up one of the country’s biggest religious minorities.

    Since then, Syria has seen several waves of sectarian violence, with Alawites fearing reprisals and being subject to crackdowns. Assad fled to Russia, an ally of his regime, where he and his family have been given asylum.

    In March, security forces were accused of killing dozens of Alawites in the coastal province of Latakia, war monitoring group Syrian Observatory for Human Rights (SOHR) reported.

    Additional reporting by BBC Monitoring



    Source link

  • Zelensky plans to meet Trump on Sunday for talks on peace deal

    Zelensky plans to meet Trump on Sunday for talks on peace deal


    EPA/Shutterstock Volodymyr Zelensky and Donald Trump in the Oval OfficeEPA/Shutterstock

    Ukraine’s president last met President Donald Trump at the White House in October

    Ukraine’s Volodymyr Zelensky has said he will meet US President Donald Trump in Florida at the weekend, as talks continue on ending Russia’s full-scale war.

    Zelensky said he expected the meeting to take place on Sunday and to focus on a US-brokered 20-point peace plan, as well as separate proposals for US security guarantees.

    Meanwhile, the Kremlin says President Vladimir Putin’s senior aide has held further talks with US officials over the phone, and that Russia has committed to continuing with the negotiations.

    Russia has spoken of “slow but steady progress” in talks but has not commented on Zelensky’s offer to withdraw troops from the eastern Donbas, if Russia pulls back too.

    Ukraine has sought to secure guarantees from the US as part of a deal, and Zelensky has suggested that a demilitarised “free economic zone” is a potential option for areas of Donbas that Russia has failed to take by force.

    On Friday, Zelensky said he had received an update on the latest technical talks from his most senior negotiator, Rustem Umerov.

    He wrote on social media: “We are not losing a single day. We have agreed on a meeting at the highest level – with President Trump in the near future. A lot can be decided before the New Year.”

    A White House meeting between Zelensky and Trump in February, the first after the US president returned to office, descended into a hostile shouting match, though their most recent meeting at the White House in October was far more amicable.

    Reuters Ukrainian soldiers eating a meal around a tableReuters

    Ukrainian soldiers were pictured eating a Christmas meal together as fighting continued along the front line

    Confirmation of planned top-level talks came after the Ukrainian leader said he had spoken to Trump’s chief negotiators, special envoy Steve Witkoff and son-in-law Jared Kushner, for an hour over the phone on Christmas Day.

    He said the latest round of negotiations had generated “new ideas” on how to end the war, and described it as a “really good conversation”.

    The White House has proposed establishing what would in effect be a demilitarised zone in eastern Ukraine where both sides agree not to deploy troops – a compromise that would avoid settling the intractable question of legal ownership over the contested territory.

    Zelensky signalled on Wednesday that if Ukraine were to pull back by up to 40km (25 miles) from the front line in the east to create an economic zone, then Russia would have to do the same from Russian-occupied parts of Ukraine’s industrial heartland in the Donbas.

    Ukraine has secured a number of changes to an earlier 28-point draft plan, which was formulated by Steve Witkoff but widely seen as being favourable to Russia.

    Zelensky told reporters on Friday that the weekend talks in Florida would focus on several documents, including US security guarantees and a separate economic agreement.

    However, Zelensky has repeatedly said the question of territory has proved to be the most difficult issue to resolve, along with the future of the Zaporizhzhia nuclear power plant.

    The White House has proposed Ukraine and Russia split the energy generated by the plant, the largest in Europe. Russian troops currently control it.

    Map showing which areas of east of Ukraine are under Russian military control or limited Russian control highlighting the regions of Luhansk, Donetsk, Zaporizhzhia, Kherson and Crimea

    Russia is unlikely to agree to a number of points in the updated US plan, especially its territorial proposals. Foreign ministry spokeswoman Maria Zakharova accused “groups of states, primarily Western European” of seeking to derail the diplomatic progress that had been made.

    Kremlin spokesman Dmitry Peskov confirmed further talks would take place between Russian and American delegations, following last weekend’s meeting between US negotiators and a delegation led by Putin envoy Kirill Dmitriev in Miami.

    Another close aide, Yuri Ushakov, had held further talks with the White House over the phone, and more were planned, Peskov added.

    Zelensky outlined the latest version of the plan this week, the first time since the original 28-point draft was leaked in November.

    Latest proposals commit the US and Europe to providing security guarantees modelled on Nato’s Article 5, committing allies to providing military support in the event Russia launches a renewed invasion.

    The deal would also see Ukraine’s military maintained at 800,000 personnel, a level the Kremlin has demanded be cut.

    Meanwhile, fighting and aerial strikes have continued. Ukrainian officials have reported at least four deaths as a result of strikes since the morning of 25 December, while the air force said it had shot down 73 drones overnight.

    Russia also said it had shot down projectiles overnight, including British Storm Shadow missiles. Ukraine’s air force said it had struck oil and gas refineries in Rostov and Krasnodar.



    Source link