Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fatalrat phishing attacks target the APAC industry using Chinese cloud services
Identity

Fatalrat phishing attacks target the APAC industry using Chinese cloud services

userBy userFebruary 25, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

China's cloud services

Various industrial organizations in the Asia-Pacific region (APAC) region are being targeted as part of phishing attacks designed to provide known malware called Fatalrat.

“This threat was coordinated by attackers using legitimate Chinese cloud content delivery network (CDN) MyQcloud and Youdao Cloud Notes services as part of their attack infrastructure,” Kaspersky ICS Cert said on Monday It states in the report.

“Attackers have adopted a sophisticated multi-stage payload delivery framework to ensure detection evasion.”

This activity has selected government agencies and industrial organizations, particularly manufacturing, construction, information technology, telecommunications, healthcare, electricity and energy, large-scale logistics and transportation, Taiwan, Malaysia, China, Japan, Thailand and Singapore. , Philippines, Vietnam, Hong Kong.

The lure attachments used in email messages suggest that phishing campaigns are designed to chase Chinese-speaking individuals.

Cybersecurity

It is worth noting that the Fatalrat campaign previously used fake Google ads as distribution vectors. In September 2023, Proofpoint recorded another email phishing campaign that breeds various malware families, including Fatalrat, Gh0st Rat, Purple Fox, and Valleyrat.

An interesting aspect of both intrusion sets is that they primarily target Chinese speakers and Japanese organizations. Some of these activities stem from threat actors tracked as Silver Fox APT.

The starting point for the latest attack chain is a phishing email containing a ZIP archive with Chinese file names. This launches a first stage loader that makes a request to Youdao Cloud Notes to make a request to Youdao Cloud Notes. DLL files and FatalRat Configurator.

For that part, the Configurator module downloads the contents of another note from Note.youdao[.]com to access configuration information. It is also designed to open decoy files to avoid raising doubt.

DLL, on the other hand, is the second stage loader responsible for downloading and installing FatalRat payloads from the server (“myqcloud[.]com) is specified in the configuration, displaying fake error messages about issues with the application running issue.

Key features of the campaign include the use of DLL sideloading techniques to advance multi-stage infection sequences and load FatalRat malware.

“Threatening actors use black and white methods to help actors take advantage of legitimate binary capabilities to make a series of events appear like normal activities,” Kaspersky said. “The attackers also used DLL sideload technology to hide the persistence of malware in legitimate process memory.”

“Fatalrat performs 17 checks on the indicator that malware is running in a virtual machine or sandbox environment. If any of the checks fail, the malware will stop running.”

It also collects information about the system and the various security solutions installed within it before terminating all instances of the rundll32.exe process and waiting for further instructions from the Command and Control (C2) server.

Cybersecurity

Fatalrat is a feature packed Troy equipped to search and delete user data in browsers such as Google Chrome and Internet Explorer, which turns the screen on and off. It’s a wooden horse. Start/stop file operations, and proxies, and terminate any process.

Currently, it is unknown what is behind the attack using Fatalrat, but overlapping with other campaigns and tactical and instrumentation means that “all of them reflect a different set of attacks that are related in some way It suggests that there is. Kaspersky rates with moderate confidence that a Chinese-speaking threat actor is behind it.

“The Fatalrat feature offers attackers almost endless possibilities for developing attacks: spreading over the network, installing remote management tools, manipulating devices, stealing, and removing sensitive information,” he said. said the person.

“The consistent use of services and interfaces in Chinese at various stages of the attack, as well as other indirect evidence, suggests that Chinese-speaking actors may be involved.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAutomattic-Owned Beeper releases redesigned desktop and iOS apps
Next Article Turkish Football Club Galatasaray has accused Mourinho of being a “racist statement.” Football News
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Benchmark for Greptile’s Lead Series A lecture, AI Code Reviewer, valued at $100 million, according to sources

Why Y Combinator Startups Working on Windows AI Agents and Get Pivoted

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.