banner Expire 25 October 2025
adv exp at 30 July 2025
banner Expire 10 February 2026
Ad End 1 November 2025
ad End 5 May 2025
ad End 25 October 2025
Ad End 4 April 2026
What's new
UniCvv
banner Expire 20 October 2024
banner Expire 15 January 2025
Money Club cc shop
Wizard's shop 2.0
Ad Ends 13 July 2025
Carding Game
BidenCash Shop
Carding.pw carding forum
Kfc CLub
Yale Lodge
best shop

Chinese hackers suspected of attacking government agencies in Mongolia

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
8,045
Reaction score
1,019
Points
212
Awards
2
  • trusted user
  • Rich User
Hackers have broken into the chat application update mechanism used by hundreds of government agencies in Mongolia.





A Chinese cybercriminal APT group is suspected of hacking into the network of a Mongolian software company and hacking into a chat application used by hundreds of Mongolian government agencies.

According to experts from ESET, the attack took place in June this year. Hackers attacked an application called Able Desktop, developed by local company Able Software. The application is an instant messaging add-on for the company's main product, the HR platform. The platform is used by more than 430 government agencies in Mongolia, including the Office of the President, the Ministry of Justice, the Ministry of Health, various local law enforcement agencies and authorities.

Due to its widespread use among government officials, ESET said the app has been a target of cyber attacks since at least 2018. In the first attacks, the criminals tried to inject the HyperBro backdoor and the PlugX remote access Trojan into the Able Desktop application and distributed Trojan versions of the application's installer via email.

In June 2020, attackers appeared to have been able to hack into Able's backend and compromised the system that delivers software updates to all of Able's software applications. Hackers have used this system at least twice to distribute the malware-infected Able Desktop chat application through a legitimate update mechanism. To carry out these attacks, the attackers again used the HyperBro backdoor, but replaced PlugX with Tmanager as a component for remote access.
 
Ad End 1 November 2024
Top