Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware

Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware

June 26, 2024 at 06:57AM

Between 2021 and 2023, threat actors with ties to China and North Korea have conducted ransomware attacks targeting government and critical infrastructure sectors worldwide. Cybersecurity firms linked these attacks to groups including ChamelGang and state-sponsored entities. The use of ransomware in cyber espionage operations blurs the lines between cybercrime and espionage, providing adversaries with strategic and operational advantages.

Key Takeaways from the Meeting Notes:
– Threat actors with suspected ties to China and North Korea have been involved in ransomware and data encryption attacks targeting government and critical infrastructure sectors worldwide between 2021 and 2023.
– ChamelGang has been associated with attacks on various entities, including the All India Institute of Medical Sciences (AIIMS) and the Presidency of Brazil, using CatB ransomware, as well as targeting a government entity in East Asia and an aviation organization in the Indian subcontinent.
– Ransomware attacks are being used for financial gain, disruption, distraction, misattribution, or removal of evidence, allowing threat actors to cover up their tracks.
– ChamelGang operates with motivations such as intelligence gathering, data theft, financial gain, denial-of-service (DoS) attacks, and information operations, using a range of tools including BeaconLoader, Cobalt Strike, backdoors like AukDoor and DoorMe, and the CatB ransomware strain.
– Attacks leveraging Jetico BestCrypt and Microsoft BitLocker have affected organizations in North America, South America, and Europe, with tactics consistent with those of Chinese hacking crew APT41 and a North Korean actor known as Andariel.
– Cyber espionage operations disguised as ransomware activities provide adversarial countries with plausible deniability by attributing actions to independent cybercriminal actors rather than state-sponsored entities, blurring the lines between cybercrime and cyber espionage.

Full Article