Source: www.databreachtoday.com – Author: 1
Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
,
Geo Focus: Asia
Symantec Traces 2021 Hong Kong Waterhole Attacks to Daggerfly
Prajeet Nair (@prajeetspeaks) •
July 23, 2024

Security researchers say they’ve traced a spate of backdoor attacks during 2021 against pro-democracy activists in Hong Kong to a Chinese cyberespionage group that’s recently re-tooled its arsenal.
See Also: Would You Rather be Cloud Smart or Cloud First in Government?
The group, tracked by the Symantec Threat Hunter Team as Daggerfly, is likely behind the previously unattributed Macma backdoor loaded onto iPhone and macOS devices. The likely-state backed threat actor delivered the malware through watering hole attacks targeting online visitors to a Hong Kong media outlet and a “prominent pro-democracy labor and political group,” Google researchers said in 2021.
Hong Kong was site of mass protests against Chinese authoritarianism from 2019 through 2020. Smaller-scale protests continued in 2021 despite the novel coronavirus pandemic and a police crackdown.
The hacking group, also tracked as Evasive Panda and Bronze Highland, is using new iterations of Macma that include improved screen capture functionality and new logic to collect a file’s system listing.
Symantec previously spotted Daggerfly attacking a “telecommunications organization” in Africa during 2023.
Threat intel researchers say they were able to link Macma with Daggerfly by identifying overlap with another known Daggerfly tool, the MgBot modular malware framework. Two variants of the Macma backdoor connected to a command and control server also used to drop MgBot. Both applications also contain code “from a single, shared library or framework.”
The threat actors behind Daggerfly are also deploying a new Windows backdoor, dubbed Trojan.Suzafk or Nightdoor, first identified by Eset researchers earlier this year.
Suzafk, as Symantec tracks it, is a multi-stage backdoor capable of using either TCP or OneDrive for command-and-control communications. Its loader drops files such as Engine.dll
and MeituUD.exe
, the latter being a legitimate application repurposed for malicious use. Engine.dll
sets up persistence through scheduled tasks and loads the final payload in memory.
Original Post url: https://www.databreachtoday.com/chinese-cyberespionage-group-expands-malware-arsenal-a-25823
Category & Tags: –
Views: 1