Ad End 1 August 2025
Ad Ends 13 July 2025
ad End 25 October 2025
Ad Ends 20 April 2025
Ad expire at 5 August 2024
banner Expire 9 June 2025
banner Expire 25 October 2025
banner Expire 10 May 2025
What's new
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

Five Chinese APTs have been quietly attacking Linux, Windows, and Android devices for ten years

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
7,907
Reaction score
942
Points
212
Awards
2
  • trusted user
  • Rich User
Groupings carry out cross-platform attacks on internal servers of companies.

0c17d9f7835309102abf1382b9eb6d0e.jpg



BlackBerry experts reported a massive malware campaign in which 5 Chinese cybercriminals compromised organizations from various industries in an attempt to steal intellectual property and other sensitive business data.

Groupings have successfully attacked companies in several critical industries through cross-platform attacks on internal servers with sensitive data. Attackers focused on enterprise Linux servers, as many of these systems are usually not as well-protected as other key infrastructures.

Among the groupings, 4 were already known to specialists earlier: Bronze Union (Emissary Panda, APT27), PassCV, Casper (Lead) and WINNTI. The fifth is relatively new and is called WLNXSPLINTER. The groupings identified by experts are presumably made up of civilian contractors who work in the interests of the Chinese government and are willing to exchange tools, methods, infrastructure, and stolen information between themselves and their government counterparts. Although the criminals pursued different goals and focused on a wide range of tasks, there was a significant degree of coordination between them during attacks on Linux platforms.

Specialists have discovered a whole range of Linux kernel-level malware, which is in service with Chinese APTs. Malicious programs include backdoors, trojans for remote access and implants for a wide range of malicious activities. One of the groups is associated with a huge DoS bot, first discovered in 2014 during attacks in Asia.

The groupings target Red Hat Enterprise, CentOS, and Ubuntu Linux systems in organizations in almost every geographic region and in almost all industries, including government, defense, military, technology, telecommunications, pharmaceuticals, manufacturing, and gaming. Attackers use hacked Linux servers as a bridgehead, undetected.

In addition to distributing malware for Linux, all five groups also targeted internal Windows systems and Android devices. The study also revealed two new malware samples for Android. One of them is very similar to the code of a commercial penetration testing tool, however, the malware was created almost two years before the tool went on sale.
 
Ad End 1 February 2024
Top