China-Sponsored Attackers Target 40K Corporate Users in 90 Days

China-Sponsored Attackers Target 40K Corporate Users in 90 Days

June 27, 2024 at 12:06PM

State-sponsored actors have launched three novel credential-phishing campaigns compromising over 40,000 corporate users, including top executives, in just three months. These attacks use highly evasive tactics to circumvent security controls, focusing on stealing credentials from corporate users for cyber-espionage purposes. Security experts stress the need for organizations to adapt and bolster their cybersecurity strategies.

From the meeting notes, I have summarized the key points as follows:

1. Three novel credential-phishing campaigns have been identified, targeting corporate users, including top-level executives, across various industries, infiltrating corporate environments through browsers and bypassing security controls.

2. The campaigns named LegalQloud, Eqooqp, and Boomer utilize highly evasive and adaptive threat (HEAT) attack techniques, bypassing multifactor authentication (MFA) and URL filtering. They primarily aim to steal Microsoft credentials.

3. The attacks have been linked to China-sponsored threat actors, and although some attribution has been made, it is not entirely clear to which nation the attacks are connected.

4. The campaigns have targeted over 3,000 unique domains across more than 10 industries and government institutions, with a significant number of malicious links successfully bypassing legacy URL filtering.

5. Security experts emphasize the need for organizations to adapt their cybersecurity strategies in response to the evolving nature of attacks, particularly those from well-resourced state-sponsored actors.

6. The prevalence of adversary-in-the-middle (AitM) attacks poses a significant challenge to organizations’ security strategies and may lead to serious breaches from credential harvesters, business email compromise (BEC), and ransomware.

7. Security awareness and phishing training are highlighted as crucial elements in staying ahead of the latest threats, emphasizing the importance of preparing users to recognize and respond to evolving attack techniques.

8. The need to embrace a zero-trust framework that evolves alongside technological advancements and shifting threat landscapes is emphasized to mitigate risks and protect sensitive information.

These are the key takeaways from the meeting notes. Let me know if you need any further information.

Full Article