RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations

RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations

June 24, 2024 at 04:24AM

Between November 2023 and April 2024, a China-linked state-sponsored threat actor named RedJuliett conducted a cyber espionage campaign targeting government, academic, and diplomatic organizations in Taiwan. They utilized various techniques, including deploying web shells and exploiting vulnerabilities, with a focus on collecting intelligence related to Taiwan’s economic policy and diplomatic relations.

From the meeting notes, it is clear that there is a significant cyber espionage campaign, labeled RedJuliett and linked to a likely China-linked state-sponsored threat actor. This cluster operates from Fuzhou, China, and targets government, academic, technology, and diplomatic organizations in Taiwan, as well as other countries including the US, Hong Kong, South Korea, and more.

The threat actor employs various techniques including exploiting internet-facing appliances, using open-source software like SoftEther, and leveraging living-off-the-land (LotL) techniques. The campaign also involves the deployment of web shells like China Chopper, devilzShell, AntSword, and Godzilla, as well as exploiting a Linux privilege escalation vulnerability known as DirtyCow (CVE-2016-5195).

The primary aim of RedJuliett seems to be intelligence collection related to Taiwan’s economic policy, trade, and diplomatic relations with other countries. The group’s targeting of vulnerabilities in internet-facing devices is highlighted as an effective way to gain initial access.

Overall, the notes provide a detailed overview of the RedJuliett cyber espionage campaign, its techniques, and its specific targeting objectives. If there are specific action items or further analysis required based on these meeting notes, please let me know.

Full Article