Linchakin

Chinese Hackers Attack & Spy Windows Users Using Rootkits

 October 04, 2021     No comments   

Chinese Hackers Attack & Spy Windows Users Using Rootkits

GhostEmperor, a new Chinese cyber-espionage group, that is continuously attacking large organizations using Windows in Southeast Asia since at least July 2020. GhostEmperor attacked several government agencies and telecommunications companies in the following countries:-

  • Malaysia
  • Thailand
  • Vietnam
  • Indonesia
  • Egypt
  • Afghanistan
  • Ethiopia

This Chinese cyber-attack group is new in this attacking field, and it utilizes very complicated tools, not only this but the threat actors of this group are mainly focused on gaining and sustaining long-term network access to accomplish its goals.

How were the victims infected initially?

The security researchers of Kaspersky Lab have initiated their investigation and during their investigation, they distinguished multiple attack vectors that triggered an epidemic chain which leads to the performance of malware in memory. 

Apart from all this, the threat actors have mostly abused vulnerabilities in the web applications that are generally running on those systems, enabling them to withdraw and perform their files. 

Moreover, the GhostEmperor infections have also hit an Exchange server that took place on March 4, 2021.  

Functionality Demodex rootkit

Demodex is loaded as a rootkit, and it generally serves the determination of covering various artifacts of the malware’s service. To access the rootkit’s functionality, the malware has to get a handle to the similar device object, and soon after the following IOCTLs will be available for further use, that we have mentioned below:-

  • 0x220204
  • 0x220224
  • 0x220300
  • 0x220304
  • 0x220308
  • 0x22030C

Rootkit loading analysis

However, the threat actors have exploited vulnerabilities that are present in signed drivers to enable the execution of unsigned code to kernel space. This method was limited by Microsoft with the initiation of Kernel Patch Protection.

Apart from this the method used by the developer of this rootkit enables loading an unsigned driver outwardly adjusting the Code Integrity image and dealing with a potential crash. 

It also exploits features of a legitimate and open-source2 signed driver identified as dbk64.sys which is transmitted along with Cheat Engine. 

Obfuscation and anti-analysis techniques

There are two common analysis tools, and here they are mentioned below:- 

  • WinDbg
  • Volatility

However, Demodex is loaded, that’s why its driver is not properly secured in WinDbg along with other system modules that are stored in a documented way.

So, the threat actors have made a voluntary choice to eliminate all PE headers from memory-loaded images in the third stage of the malware as well as the rootkit’s driver.

GhostEmperor focus on high-profile targets

The whole attack indicates that the underlying actor achieved to remain under the detector for months. But, the threat actors have conveyed the required level of research to make the Demodex rootkit fully functional on Windows 10.

Well doing this will allow it to load via documented features of a third-party signed and benign driver, as the threat actors of the GhostEmperor have been using strong and sophisticated tools.

Network infrastructure

GhostEmperor has used hosting services based in Hong Kong and South Korea, like Daou Technology or Anchent Asia Limited. And here they are mentioned below:-

  • newlylab[.]com
  • reclubpress[.]com
  • webdignusdata[.]com
  • freedecrease[.]com
  • aftercould[.]com
  • datacentreonline[.]com
  • newfreepre[.]com

And here are the IP addresses used by the threat actors:-

  • 223.135[.]214
  • 148.165[.]158
  • 102.114[.]55
  • 102.113[.]57
  • 102.113[.]240

While GhostEmperor might be a new Chinese cyber-attack group but it has come up with the most sophisticated tools, that made its attack more complicated. Not only this but the group has also used some clever hacker tricks that are repackaging data into fake multimedia formats. 

However, using this trick will help the threat actors a lot, and the traffic of the GhostEmperor malware is normally concealed as RIFF, JPEG, or PNG files that are hard to recognize.

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • 100 days of war in Ukraine: How the conflict is playing out in cyberspace It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict On January 14th this year, a rai… Read More
  • Top 10 Best Free VPN Services of 2022Best VPN Services 2022: VPNs are the best way to get you online security; access blocked websites, and much more. Virtual Private Network to call it i… Read More
  • Patriot Viper VP4300 PCIe 4.0 SSD Quick Look: Easy PS5 Upgrade If you happen to be among the tens of people who bought one of Sony’s PlayStation 5 consoles at a regular retail store, for MSRP, and actually kept i… Read More
  • Build to Rent DAO: Pioneering the Concept of 'Rent-to-Earn' ‘digital nomads’ are mobile like never before; they can both move internally and across borders. They are pioneers of a new, ‘informational’ society.… Read More
  • How to Use Vanish Mode on InstagramVanish Mode is one of the best features on Instagram. It was added in 2021, and it has already become very popular. Vanish Mode allows user to hide th… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates