Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers

December 5, 2024 at 06:24AM

A suspected Chinese threat actor targeted a large U.S. organization between April and August 2024, compromising multiple computers and potentially exfiltrating email data. The attack used tactics, such as DLL side-loading and open-source tools. Previous links to another Chinese hacking group were also noted. Specific intrusion details remain unclear.

**Meeting Takeaways – December 5, 2024**

1. **Incident Overview**:
– A suspected Chinese threat actor targeted a large U.S. organization, with malicious activity identified from April 11 to August 2024.
– Initial intrusion may have started earlier; full scope of compromise not disclosed.

2. **Attack Methodology**:
– Attackers engaged in lateral movement across the organization’s network, compromising multiple machines, including Exchange Servers.
– Evidence of email intelligence gathering and deployment of data exfiltration tools was present.

3. **Attribution to Chinese Actors**:
– Links to China are suggested through tactics like DLL side-loading, commonly associated with Chinese threat groups.
– Notable connections to an earlier attack in 2023 from a group linked to the Chinese hacking crew Daggerfly (also known as Bronze Highland).

4. **Tools and Techniques**:
– Attack utilized both open-source tools (e.g., FileZilla, Impacket, PSCP) and living-off-the-land programs (e.g., WMI, PsExec, PowerShell).
– The exact method of initial network access is currently unknown, but WMI commands indicate prior compromises.

5. **Focus on Exchange Servers**:
– The attackers specifically targeted Exchange servers, likely for email data exfiltration.

6. **Broader Concerns**:
– Discussion on the dynamics of China’s cyber operations, including the role of universities and hack-for-hire contractors.
– Fake companies linked to Chinese state entities may obscure attack attribution and procure necessary digital resources.

7. **Next Steps**:
– Continued monitoring and investigation of cyber threats, particularly those related to state-sponsored Chinese operations.

**Conclusion**: Ongoing vigilance is required in response to evolving cyber threats, particularly from state-sponsored actors such as those linked to China.

Full Article