Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The Future of Process Automation is Here: Meet TwinH

Jack Dorsey says his “safe” new bitchat app hasn’t been tested for security

Hallucinations about soundslice on chatgpt music app frequently, founders have made to lie

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Winnti Apt41 targets Japanese companies with its Revivalstone Cyberspy Campaign
Identity

Winnti Apt41 targets Japanese companies with its Revivalstone Cyberspy Campaign

userBy userFebruary 18, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 18, 2025Ravi LakshmananMalware/Network Security

The China-related threat actor known as Winnti is attributed to a new campaign called Revival Stone in March 2024 that targeted Japanese companies in the manufacturing, materials and energy sectors.

Activities detailed by Japanese cybersecurity company LAC overlap with EARTH FREYBUG tracked by Trend Micro. It is rated as a subset within the APT41 Cyberspy Group and is rated by Symantec As As Symantec by the Cyberseason under Operation Cuckoobees. Black Fly.

APT41 is described as a highly skilled and systematic actor with the ability to not only poison the supply chain, but also carry out spy attacks. Its campaigns are often designed with stealth in mind, not only bypassing security software installed in your environment, but also harvesting important information and secrets for persistent remote access. Not only will you establish a channel for, but you will also use a swarm of tactics to achieve your goals.

Cybersecurity

“Many of the group’s espionage is consistent with the national strategic goals, targeting a wide range of public and private industry sectors around the world,” Lac says.

“The attacks of this threat group are characterized by the use of Winnti malware. Winnti malware has its own rootkit that allows communication to be hidden and manipulated, and legitimate digital certificates stolen from the malware can be used.

Winnti, which has been active since at least 2012, has picked out manufacturing and materials-related organizations primarily in Asia as of 2022 and has run a recent campaign between November and October 2023. IBM Lotus Domino deploying malware as follows:

Deathlotus – Passive CGI backdoor that supports file creation and command execution Defense Evasion Utility written in Unapimon-C++ Privatelog – The loader used to drop Winnti Rat (aka DeployLog) is named Winnkit is used to provide a kernel-level Rootkit. rootkit installer means cunningpigeon – Use the Microsoft Graph API to use commands (file and process management, and custom proxy) to enable rootkit with the ability to intercept TCPIP network interfaces, and to use infected cover channels. Create endpoint shadowgaz in an intranet – Passive backdoor reuse of listening ports from IIS web server

The latest attack chain documented by LAC takes advantage of a SQL injection vulnerability in unspecified enterprise resource planning (ERP) systems to web shells such as Chinese choppers and Behinder on compromised servers (aka Bingxia) and Icecorpion (Icecorpion) and drop using access. To perform reconnaissance, collect lateral movement credentials and provide an improved version of Winnti malware.

Intrusion reach is further expanded to managed service providers (MSPs) by leveraging shared accounts, and then further expanded by weaponizing the company’s infrastructure and propagating the malware further to three other organizations. It is said that it was done.

Luck said that references to Treadstone and Stonev5 were also found in the Revivalstone campaign. The former is a controller designed to work with Winnti malware, and was also included in last year’s I-Soon (aka Ancan) leak. Linux Malware Control Panel.

Cybersecurity

“If treadstones have the same meaning as winnti malware, that’s just speculation, but Stonev5 could mean version 5, and the malware used in this attack could be Winnti v5.0. It’s sexual.”

“The new Winnti malware is implemented with features such as obfuscation, updated encryption algorithms, and security products avoidance, and this group of attackers may update the Winnti malware features and continue to use them in attacks. there is.”

This disclosure has been made since November 2024, a Linux-based attack called SSHDInjementor, which was equipped to hijack SSH daemons on network appliances by injecting malware for permanent access and concealment actions. We’ve explained the suite in detail.

A malware suite associated with another Chinese nation-state hacking group known as Daggerfly (aka Bronze Highland and Evasive Panda) is designed for data removal, and hears incoming orders from remote servers, allowing you to access and execute processes and Enumerate services, perform file operations, perform file operations, and perform file operations. Start the terminal and execute the terminal command.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePulsar helium: The road to production
Next Article Protecting animal health for a better society
user
  • Website

Related Posts

The Future of Process Automation is Here: Meet TwinH

July 9, 2025

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

July 9, 2025

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

July 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The Future of Process Automation is Here: Meet TwinH

Jack Dorsey says his “safe” new bitchat app hasn’t been tested for security

Hallucinations about soundslice on chatgpt music app frequently, founders have made to lie

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.