June 10, 2023Ravi LakshmananCyber ​​Attack/Malware

Publicly traded companies in Vietnam have been targeted as part of an ongoing campaign to deploy a new backdoor called “. Spectra Viper.

“SPECTRALVIPER is a highly obfuscated and previously undisclosed x64 backdoor that provides PE loading and injection, file upload and download, file and directory manipulation, and token impersonation capabilities,” Elastic Security Labs said. Said in Friday’s report.

The attack is believed to be by the actor tracked as REF2754 and overlaps with Vietnamese threat groups known as APT32, Canvas Cyclone (formerly Bismuth), Cobalt Kitty, and OceanLotus.

In December 2020, Meta linked the hacking group’s activities to a cybersecurity firm called CyberOne Group.

cyber security

The latest infection flow discovered by Elastic is SysInternals procedure dump This utility is used to load unsigned DLL files containing DONUTULOADER. This file is configured to load SPECTRALVIPER and other malware such as P8LOADER and POWERSEAL.

SPECTRALVIPER is designed to connect to an attacker-controlled server and wait for further commands while employing obfuscation techniques such as: Flattening control flow To resist analysis.

SPECTRALPIPER BACKDOOR

Written in C++, P8LOADER can launch arbitrary payloads from files or memory. It also uses a dedicated PowerShell runner named POWERSEAL that is instrumented to run the provided PowerShell scripts or commands.

REF2754 is said to have tactical similarities with another group REF4322It is known to deploy “post-exploit implants”, primarily targeting companies in Vietnam. Foreal (aka Rizzo).

This link raises the possibility that “both REF4322 and REF2754 activity groups represent campaigns planned and carried out by Vietnam state-related threats.”

upcoming webinars

🔐 Mastering API Security: Understanding Your True Attack Surface

Discover untapped vulnerabilities in your API ecosystem and take proactive steps towards ironclad security. Join us for an insightful webinar!

join the session

This finding suggests that an intrusion set called REF2924 Somni Records It uses DNS queries to communicate with remote servers and bypass network security controls.

SOMNIRECORD, like NAPLISTENER, leverages existing open source projects and refines its functionality to retrieve information about infected machines, list all running processes, deploy web shells, and extract files already present in the system. Allows launching of executable files.

“The use of open source projects by attackers indicates that attackers are taking steps to customize existing tools for their specific needs, and may be trying to counter attribution attempts. Yes,” the company said.

Did you enjoy this article? Follow us twitter and LinkedIn To read more of the exclusive content we post.

cropped-BTA_Logo-B-1-scaled-1
YOUR FUTURE STARTS HERE.

BLUE TRAINING ACADEMY

Register now for our membership to gain access to our elite training program and fast forward your career today!

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

cropped-BTA_Logo-B-1-scaled-1
Security Blog

Blue Training Academy

Blue Training Academy was developed in 2018 as a educational and training facility for continuing education and certification courses. Blue Training Academy is an educational institution that allows for all sectors of the public and Criminal Justice field to gain ongoing training and education.

Copyright ©️ All rights reserved. | Blue Training Academy Blog