By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads
Tech News

New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads

By Viral Trending Content 5 Min Read
Share
SHARE

Aug 30, 2024Ravie LakshmananCyber Espionage / Threat Intelligence

Cobalt Strike Payloads

Chinese-speaking users are the target of a “highly organized and sophisticated attack” campaign that is likely leveraging phishing emails to infect Windows systems with Cobalt Strike payloads.

“The attackers managed to move laterally, establish persistence and remain undetected within the systems for more than two weeks,” Securonix researchers Den Iuzvyk and Tim Peck said in a new report.

The covert campaign, codenamed SLOW#TEMPEST and not attributed to any known threat actor, commences with malicious ZIP files that, when unpacked, activates the infection chain, leading to the deployment of the post-exploitation toolkit on compromised systems.

Present with the ZIP archive is a Windows shortcut (LNK) file that disguises itself as a Microsoft Word file, “违规远程控制软件人员名单.docx.lnk,” which roughly translates to “List of people who violated the remote control software regulations.”

“Given the language used in the lure files, it’s likely that specific Chinese related business or government sectors could be targeted as they would both employ individuals who follow ‘remote control software regulations,'” the researchers pointed out.

Cybersecurity

The LNK file acts as a conduit to launch a legitimate Microsoft binary (“LicensingUI.exe”) that employs DLL side-loading to execute a rogue DLL (“dui70.dll”). Both the files are part of the ZIP archive within a directory called “其他信息.__MACOS__._MACOS___MACOSX_MACOS_.” The attack marks the first time DLL side-loading via LicensingUI.exe has been reported.

The DLL file is a Cobalt Strike implant that allows for persistent and stealthy access to the infected host, while establishing contact with a remote server (“123.207.74[.]22”).

The remote access is said to have allowed the attackers to conduct a series of hands-on activities, including deploying additional payloads for reconnaissance and setting up proxied connections.

The infection chain is also notable for setting up a scheduled task to periodically execute a malicious executable called “lld.exe” that can run arbitrary shellcode directly in memory, thereby leaving minimal footprints on disk.

Cobalt Strike Payloads

“The attackers further enabled themselves to hide in the weeds in compromised systems by manually elevating the privileges of the built-in Guest user account,” the researchers said.

“This account, typically disabled and minimally privileged, was transformed into a powerful access point by adding it to the critical administrative group and assigning it a new password. This backdoor allows them to maintain access to the system with minimal detection, as the Guest account is often not monitored as closely as other user accounts.”

The unknown threat actor subsequently proceeded to move laterally across the network using Remote Desktop Protocol (RDP) and credentials obtained via the Mimikatz password extraction tool, followed by setting up remote connections back to their command-and-control (C2) server from each of those machines.

The post-exploitation phase is further characterized by the execution of several enumeration commands and the use of the BloodHound tool for active directory (AD) reconnaissance, the results of which were then exfiltrated in the form of a ZIP archive.

Cybersecurity

The connections to China are reinforced by the fact that all of the C2 servers are hosted in China by Shenzhen Tencent Computer Systems Company Limited. On top of that, a majority of the artifacts connected with the campaign have originated from China.

“Although there was no solid evidence linking this attack to any known APT groups, it is likely orchestrated by a seasoned threat actor who had experience using advanced exploitation frameworks such as Cobalt Strike and a wide range of other post-exploitation tools,” the researchers concluded.

“The campaign’s complexity is evident in its methodical approach to initial compromise, persistence, privilege escalation and lateral movement across the network.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

What caused the global Cloudflare outage?

This Home Robot Clears Tables and Loads the Dishwasher All by Itself

New WrtHug campaign hijacks thousands of end-of-life ASUS routers

London Phone Thieves Rejecting Samsung Galaxy Phones for iPhones

TAGGED: Advanced Persistent Threat, Cobalt Strike, cyber espionage, cyber forensics, Cyber Security, Cybersecurity, Information security, Internet, Malware, network security, phishing attack, Threat Intelligence
Share This Article
Facebook Twitter Copy Link
Previous Article 11 Killed In Israeli Strike On School Sheltering Displaced Palestinians
Next Article 3 Reasons Why Your First Purchase In September Should Be Playdoge and Mpeppe (MPEPE)
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Mafia: The Old Country Update Adds Classic Difficulty, New Cars, and First-Person Driving on November 20th
Gaming News
Aave rolls out V4 testnet with developer preview of upcoming “Pro” experience
Crypto
What’s Going On With Saylor’s Bitcoin Strategy, And Is A Collapse Coming?
Crypto
Aurora nudges restaurants to quit automatically serving water as part of effort to count ‘every single drop’
Business
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
Tech News
What caused the global Cloudflare outage?
Tech News
Nestlé sticks with water branding as French court rejects legal case
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Mafia: The Old Country Update Adds Classic Difficulty, New Cars, and First-Person Driving on November 20th

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Mafia: The Old Country Update Adds Classic Difficulty, New Cars, and First-Person Driving on November 20th
November 19, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?