Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TechCrunch Mobility: Robotaxi expansions that really matter

How much of the AI ​​data center boom will be powered by renewable energy?

History of Science: “Patient Zero” Infects SARS, an Older Relative of the New Coronavirus — November 16, 2002

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Earth Car Targets Southeast Asia with rootkits and cloud-based data theft tools
Identity

Earth Car Targets Southeast Asia with rootkits and cloud-based data theft tools

userBy userApril 28, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rootkit and cloud-based data t

The government and telecommunications sector in Southeast Asia have been targeting a “sophisticated” campaign since June 2024 by a new Advanced Persistent Threat (APT) group called Earth Kurma.

Attacks are using micro-trends to utilize custom malware, rootkits and cloud storage services for data removal. The Philippines, Vietnam, Thailand and Malaysia are one of the prominent targets.

“This campaign poses high business risks through targeted spying, qualification theft, persistent scaffolding established through kernel-level rootkits, and data removal via trusted cloud platforms,” ​​security researchers Nick Dye and Sunny Lou said in an analysis published last week.

The activities of threat actors date back to November 2020, with intrusions relying primarily on services such as Dropbox and Microsoft Onedrive using tools such as TESDAT and SimpoboxSpy.

Two other notable malware families in the Armory include Rootkits such as Krnrat and Moriya. The latter has been previously observed in attacks targeting well-known organizations in Asia and Africa as part of a Tunnelsnake called the espionage campaign.

Cybersecurity

Trend Micro also said that the SimpoboxSpy and exfiltration scripts used in the attack overlap with another APT group called Toddycat. However, the decisive attribution remains decisive.

Currently, it is not currently known how threat actors gain initial access to their target environment. The initial scaffolding is then abused and scans and performs lateral movement using a variety of tools such as NBTSCAN, LADON, FRPC, WMIHACKER, ICMPINGER, and more. What is being deployed is a keylogger called Kmlog to harvest the credentials.

It is worth noting that the use of the open source radon framework was attributed to a China-related hacking group previously known as TA428 (aka Visicic Panda).

Host persistence is achieved by three different loader strains called Dunloader, Tesdat, and DMLoader, which can load and run the payload of the next stage into memory. These consist of cobalt strike beacons, rootkits like Krnrat and Moriya, and data removal malware.

What distinguishes these attacks is the use of the lood-the-land-the-land (lotl) technique to install legitimate system tools and features, in this case, rootkits that use Syssetup.dll, rather than introducing malware that can be easily detected by hackers.

While Moriya is designed to inspect incoming TCP packets in malicious payloads and inject shellcode into the newly generated “svChost.exe” process, KRNRAT is a fusion of five different open source projects with the capabilities of process operations, potential execution of files, execution of shellcode, command and control.

Krnrat, like Moriya, is designed to load rootkit into the user mode agent and inject it into “svchost.exe”. The user mode agent acts as a backdoor to retrieve subsequent payloads from the C2 server.

Cybersecurity

“Before removing the files, some commands executed by the loader TESDAT collected specific document files in .pdf, .doc, .docx, .docx, .xls, .xlsx, and .pptx for .pdf, .doc, .docx, .xlsx, .pptx, and .pptx. “The documents are first placed in a newly created folder named ‘TMP’. This is archived using Winrar with a specific password. ”

One of the bespoke tools used to exfoliate data is simpoboxSpy, which allows you to upload RAR archives to dropboxes with specific access tokens. According to a report by Kasperksy in October 2023, generic dropbox uploaders are “probably not used exclusively by ToddyCat.”

Another program used for the same purpose, Odriz uploads the collected information to OneDrive by specifying the OneDrive Refresh token as an input parameter.

“Earth cars are very active and continue to target countries around Southeast Asia,” Trend Micro said. “They have the ability to adapt to their victim environment and maintain a stealth presence.”

“They can also customize their toolset by reusing the same codebase from previously identified campaigns, and sometimes they can leverage the victim’s infrastructure to achieve their goals.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFirst quarter recruitment trends and forecasts for this year
Next Article Effective natural methane reduction solutions for livestock agriculture
user
  • Website

Related Posts

RondoDox exploits unpatched XWiki servers to draw more devices into botnet

November 15, 2025

Five Americans plead guilty to helping North Korean IT workers break into 136 companies

November 15, 2025

North Korean hackers turn JSON service into covert malware delivery channel

November 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TechCrunch Mobility: Robotaxi expansions that really matter

How much of the AI ​​data center boom will be powered by renewable energy?

History of Science: “Patient Zero” Infects SARS, an Older Relative of the New Coronavirus — November 16, 2002

JP Morgan doesn’t want to pay Frank founder Charlie Jarvis’ legal costs

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.