By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign
Tech News

Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign

By Viral Trending Content 4 Min Read
Share
SHARE

Jun 21, 2024NewsroomMalware / Threat Intelligence

Chinese Hackers

A previously undocumented Chinese-speaking threat actor codenamed SneakyChef has been linked to an espionage campaign primarily targeting government entities across Asia and EMEA (Europe, Middle East, and Africa) with SugarGh0st malware since at least August 2023.

“SneakyChef uses lures that are scanned documents of government agencies, most of which are related to various countries’ Ministries of Foreign Affairs or embassies,” Cisco Talos researchers Chetan Raghuprasad and Ashley Shen said in an analysis published today.

Activities related to the hacking crew were first highlighted by the cybersecurity company in late November 2023 in connection with an attack campaign that singled out South Korea and Uzbekistan with a custom variant of Gh0st RAT called SugarGh0st.

A subsequent analysis from Proofpoint last month uncovered the use of SugarGh0st RAT against U.S. organizations involved in artificial intelligence efforts, including those in academia, private industry, and government service. It’s tracking the cluster under the name UNK_SweetSpecter.

Cybersecurity

Talos said that it has since observed the same malware being used to likely focus on various government entities across Angola, India, Latvia, Saudi Arabia, and Turkmenistan based on the lure documents used in the spear-phishing campaigns, indicating a widening of the scope of the countries targeted.

In addition to leveraging attack chains that make use of Windows Shortcut (LNK) files embedded within RAR archives to deliver SugarGh0st, the new wave has been found to employ a self-extracting RAR archive (SFX) as an initial infection vector to launch a Visual Basic Script (VBS) that ultimately executes the malware by means of a loader while simultaneously displaying the decoy file.

Chinese Hackers

The attacks against Angola are also notable for the fact that it utilizes a new remote access trojan codenamed SpiceRAT using lures from Neytralny Turkmenistan, a Russian-language newspaper in Turkmenistan.

SpiceRAT, for its part, employs two different infection chains for propagation, one of which uses an LNK file present inside a RAR archive that deploys the malware using DLL side-loading techniques.

“When the victim extracts the RAR file, it drops the LNK and a hidden folder on their machine,” the researchers said. “After a victim opens the shortcut file, which masqueraded as a PDF document, it executes an embedded command to run the malicious launcher executable from the dropped hidden folder.”

Cybersecurity

The launcher then proceeds to display the decoy document to the victim and run a legitimate binary (“dxcap.exe”), which subsequently sideloads a malicious DLL responsible for loading SpiceRAT.

The second variant entails the use of an HTML Application (HTA) that drops a Windows batch script and a Base64-encoded downloader binary, with the former launching the executable by means of a scheduled task every five minutes.

Chinese Hackers

The batch script is also engineered to run another legitimate executable “ChromeDriver.exe” every 10 minutes, which then sideloads a rogue DLL that, in turn, loads SpiceRAT. Each of these components – ChromeDriver.exe, the DLL, and the RAT payload – are extracted from a ZIP archive retrieved by the downloader binary from a remote server.

SpiceRAT also takes advantage of the DLL side-loading technique to start a DLL loader, which captures the list of running processes to check if it’s being debugged, followed by running the main module from memory.

“With the capability to download and run executable binaries and arbitrary commands, SpiceRAT significantly increases the attack surface on the victim’s network, paving the way for further attacks,” Talos said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

AWS announces Fastnet, a dedicated high-capacity transatlantic cable connecting the U.S. and Ireland

Zohran Mamdani’s Campaign Figured Out How to Channel Fandom

How can derailments in workplace leadership cause a toxic triangle?

Amazon vs Perplexity AI: Legal Battle over AI Browser Shopping Access

5 Reasons Why the Motorola Edge 70 is the Super-slim Phone To Buy

TAGGED: Advanced Persistent Threat, Chinese Hackers, cyber espionage, Cyber Security, Internet, Malware, network security, phishing attack, Threat Intelligence
Share This Article
Facebook Twitter Copy Link
Previous Article Bitcoin Bullish Turnaround: Analyst Predicts Greater Bull Reversal, New ATH Looms?
Next Article Colorado GOP spent $20,000 to boost its chairman’s congressional campaign, records show
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Binance And Wintermute In Cahoots? Pundit Shares Theory On What Is Driving Bitcoin, Ethereum Price Crashes
Crypto
“Stop making autónomos fear Hacienda,” says Feijóo
Business
Horrific UPS cargo plane disaster in Kentucky – 7 confirmed dead
World News
AWS announces Fastnet, a dedicated high-capacity transatlantic cable connecting the U.S. and Ireland
Tech News
Zohran Mamdani’s Campaign Figured Out How to Channel Fandom
Tech News
Cyberattack on Marks & Spencer slices profits by more than a half
Business
Trump may become face of economic discontent, year after such worries helped him win big
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Binance And Wintermute In Cahoots? Pundit Shares Theory On What Is Driving Bitcoin, Ethereum Price Crashes

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Binance And Wintermute In Cahoots? Pundit Shares Theory On What Is Driving Bitcoin, Ethereum Price Crashes
November 5, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?