banner Expire 1 February 2024
Ad Ends 13 January 2025
ad End 25 April 2025
banner Expire 25 April 2025
banner Expire 16 November 2024
ad expire at 08 november 2024
What's new
banner Expire 16 November 2024
Ad Ends 20 January 2025
banner Expire 11 November 2024
Adv exp on 11 NOv 2024
banner Expire 15 January 2025
Ad expire at 5 August 2024
banner Expire 20 October 2024
Western union transfer
UniCvv
casino
swipe store
adv exp at 23 August 2024
Carding.pw carding forum
BidenCash Shop
Kfc CLub

Dark_Code_x

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 28, 2020
Messages
6,614
Reaction score
715
Points
212
Awards
2
  • Somebody Likes you
  • First post
Groupings carry out cross-platform attacks on internal servers of companies.






BlackBerry experts reported a massive malware campaign in which 5 Chinese cybercriminals compromised organizations from various industries in an attempt to steal intellectual property and other sensitive business data.

Groupings have successfully attacked companies in several critical industries through cross-platform attacks on internal servers with sensitive data. Attackers focused on enterprise Linux servers, as many of these systems are usually not as well-protected as other key infrastructures.

Among the groupings, 4 were already known to specialists earlier: Bronze Union (Emissary Panda, APT27), PassCV, Casper (Lead) and WINNTI. The fifth is relatively new and is called WLNXSPLINTER. The groupings identified by experts are presumably made up of civilian contractors who work in the interests of the Chinese government and are willing to exchange tools, methods, infrastructure, and stolen information between themselves and their government counterparts. Although the criminals pursued different goals and focused on a wide range of tasks, there was a significant degree of coordination between them during attacks on Linux platforms.

Specialists have discovered a whole range of Linux kernel-level malware, which is in service with Chinese APTs. Malicious programs include backdoors, trojans for remote access and implants for a wide range of malicious activities. One of the groups is associated with a huge DoS bot, first discovered in 2014 during attacks in Asia.

The groupings target Red Hat Enterprise, CentOS, and Ubuntu Linux systems in organizations in almost every geographic region and in almost all industries, including government, defense, military, technology, telecommunications, pharmaceuticals, manufacturing, and gaming. Attackers use hacked Linux servers as a bridgehead, undetected.

In addition to distributing malware for Linux, all five groups also targeted internal Windows systems and Android devices. The study also revealed two new malware samples for Android. One of them is very similar to the code of a commercial penetration testing tool, however, the malware was created almost two years before the tool went on sale.
 
Ad End 1 February 2024
Top