China-linked Twisted Panda caught spying on Russian R&D orgs • The Register

2022-05-20 20:37:49 By : Ms. Leina Chen

Chinese cyberspies targeted two Russian defense institutes and possibly another research facility in Belarus, according to Check Point Research.

The new campaign, dubbed Twisted Panda, is part of a larger, state-sponsored espionage operation that has been ongoing for several months, if not nearly a year, according to the security shop.

In a technical analysis, the researchers detail the various malicious stages and payloads of the campaign that used sanctions-related phishing emails to attack Russian entities, which are part of the state-owned defense conglomerate Rostec Corporation.

Check Point Research also noted that around the same time that they observed the Twisted Panda attacks, another Chinese advanced persistent threat (APT) group Mustang Panda was observed exploiting the invasion of Ukraine to target Russian organizations.

In fact, Twisted Panda may have connections to Mustang Panda or another Beijing-backed spy ring called Stone Panda, aka APT10, according to the security researchers.

In addition to the timing of the attacks, other tools and techniques used in the new campaign overlap with China-based APT groups, they wrote. Because of this, the researchers attributed the new cyberspying operation "with high confidence to a Chinese threat actor."

During the the course of the research, the security shop also uncovered a similar loader that contained that looked like an easier variant of the same backdoor. And based on this, the researchers say they expect Twisted Panda has been active since June 2021.

The new campaign started on March 23 with phishing emails sent to defense research institutes in Russia. All of them had the same subject: "List of [target institute name] persons under US sanctions for invading Ukraine", a malicious document attached, and contained a link to an attacker-controlled site designed to look like the Health Ministry of Russia.

An email went out to an organization in Minsk, Belarus, on the same day with the subject: "US Spread of Deadly Pathogens in Belarus". 

Additionally, all of the attached documents looked like official Russian Ministry of Health documents with the official emblem and title.

Downloading the malicious document drops a sophisticated loader that not only hides its functionality, but also avoids detection of suspicious API calls by dynamically resolving them with name hashing. 

By using DLL sideloading, which Check Point noted is "a favorite evasion technique used by multiple Chinese actors," the malware evades anit-virus tools. The researchers cited PlugX malware, used by Mustang Panda, and a more recent APT10 global espionage campaign that used the VLC player for side-loading.

In this case of the Twisted Panda campaign, "the actual running process is valid and signed by Microsoft," according to the analysis.

According to the security researchers, the loader contains two shellcodes. The first one runs the persistence and cleanup script. And the second is a multi-layer loader. "The goal is to consecutively decrypt the other three fileless loader layers and eventually load the main payload in memory," Check Point Research explained.

The main payload is a previously undocumented Spinner backdoor, which uses two types of obfuscations. And while the backdoor is new, the researchers noted that the obfuscation methods have been used together in earlier samples attributed to Stone Panda and Mustang Panda. These are control-flow flattening, which makes the code clow non-linear, and opaque predicates, which ultimately causes the binary to perform needless calculations. 

"Both methods make it difficult to analyze the payload, but together, they make the analysis painful, time-consuming, and tedious," the security shop said.

The Spinner backdoor's main purpose is to run additional payloads sent from a command-and-control server, although the researchers say they didn't intercept any of these other payloads. However, "we believe that selected victims likely received the full backdoor with additional capabilities," they noted.

The victims — research institutes that focus on developing electronic warfare systems, military-specialized onboard radio-electronic equipment, avionics systems for civil aviation, and medical equipment and control systems for energy, transportation, and engineering industries — also tie the Twisted Panda campaign to China's five-year plan, which aims to expand the country's scientific and technical capabilities. 

And, as the FBI has warned [PDF], the Chinese government isn't above using cyberespionage and IP theft to accomplish these goals.

As Check Point Research concluded: "Together with the previous reports of Chinese APT groups conducting their espionage operations against the Russian defense and governmental sector, the Twisted Panda campaign described in this research might serve as more evidence of the use of espionage in a systematic and long-term effort to achieve Chinese strategic objectives in technological superiority and military power." ®

The US Federal Trade Commission on Thursday said it intends to take action against educational technology companies that unlawfully collect data from children using online educational services.

In a policy statement, the agency said, "Children should not have to needlessly hand over their data and forfeit their privacy in order to do their schoolwork or participate in remote learning, especially given the wide and increasing adoption of ed tech tools."

The agency says it will scrutinize educational service providers to ensure that they are meeting their legal obligations under COPPA, the Children's Online Privacy Protection Act.

The saga surrounding Arm's joint venture in China just took another intriguing turn: a mysterious firm named Lotcap Group claims it has signed a letter of intent to buy a 51 percent stake in Arm China from existing investors in the country.

In a Chinese-language press release posted Wednesday, Lotcap said it has formed a subsidiary, Lotcap Fund, to buy a majority stake in the joint venture. However, reporting by one newspaper suggested that the investment firm still needs the approval of one significant investor to gain 51 percent control of Arm China.

The development comes a couple of weeks after Arm China said that its former CEO, Allen Wu, was refusing once again to step down from his position, despite the company's board voting in late April to replace Wu with two co-chief executives. SoftBank Group, which owns 49 percent of the Chinese venture, has been trying to unentangle Arm China from Wu as the Japanese tech investment giant plans for an initial public offering of the British parent company.

SmartNICs have the potential to accelerate enterprise workloads, but don't expect to see them bring hyperscale-class efficiency to most datacenters anytime soon, ZK Research's Zeus Kerravala told The Register.

SmartNICs are widely deployed in cloud and hyperscale datacenters as a means to offload input/output (I/O) intensive network, security, and storage operations from the CPU, freeing it up to run revenue generating tenant workloads. Some more advanced chips even offload the hypervisor to further separate the infrastructure management layer from the rest of the server.

Despite relative success in the cloud and a flurry of innovation from the still-limited vendor SmartNIC ecosystem, including Mellanox (Nvidia), Intel, Marvell, and Xilinx (AMD), Kerravala argues that the use cases for enterprise datacenters are unlikely to resemble those of the major hyperscalers, at least in the near term.

The US is racing to catch up with China in supercomputing performance amid fears that the country may widen its lead in exascale computers over the next decade, according to reports.

The Frontier supercomputer at Oak Ridge National Laboratory is expected to be the first exascale system in the US once it is fully operational, but China already has two exascale systems up and running since last year, as reported on our sister site The Next Platform.

This lead may widen as the US has three exascale systems in the pipeline, while China aims to have up to 10 operational systems by 2025, says a report in the Financial times.

Laptop vendor Framework Computer has launched new faster models. Unlike in the case of any other laptop maker, if you already have one, this is good news.

Modern laptops tend to be promoted on the basis of thinness and lightness, and the Framework range is no different. The machines have 13.5-inch (8.89cm) screens, are just under 16mm thick (0.6 inch), and weigh 1.3kg (2lb 14oz).

The new models have faster 12th-generation Intel Core CPUs.

Two and a half years after its first disastrous launch, Boeing has once again fired its CST-100 Starliner capsule at the International Space Station.

This time it appeared to go well, launching at 18:54 ET from Space Launch Complex 41 at Cape Canaveral. The RD-180 main engine and twin solid rocket boosters of the Atlas V performed as planned before Starliner was pushed to near orbital velocity by the Centaur upper stage.

After separation from the Centaur, Starliner fired its own thrusters for orbital insertion and is on course for the ISS. Docking is scheduled for approximately 19:10 ET today (23:10 UTC).

US president Joe Biden kicked off his first Asian tour since taking office in South Korea, where he visited a Samsung semiconductor fab said to be the model for the company's planned plant in Taylor, Texas.

While speaking at the Samsung Electronics Pyeongtaek Campus, Biden said the region will be a key part of the next several decades – a reason "to invest in one another to deepen our business ties.". 

Much of the talk on Biden's five-day trip to South Korea and Japan will center around broader deepening of economic and business ties. In Pyeongtaek, however, the emphasis was on semiconductor cooperation. While touring the plant with recently elected South Korean president Yoon Suk Yeol, Biden noted "these little chips are the key to propelling us into the next era of humanity's technological development."

At Meta's first Conversations keynote yesterday, the company announced the WhatsApp Cloud API, aimed at improving the customer service experience for businesses of all sizes.

Meta already has the WhatsApp Business API, the first revenue-generating enterprise product for the otherwise free messaging app, where companies pay WhatsApp on a per-message basis and can use the platform to direct customer communications to other lines like SMS, email, other apps, and more.

It's basically another online presence where enterprises can set up shop to make it easier for customers to get in touch. But the WhatsApp Business API is on-premises and would normally need a solutions provider like Twilio to facilitate back-end integration.

Microsoft has released an out-of-band patch to deal with an authentication issue that was introduced in the May 10 Windows update.

Elizabeth Tyler, cyber security consultant on Microsoft's Detection and Response Team, confirmed the fix to worried administrators early this morning.

UK customers of datacenter and colo service provider Sungard Availability Services are to be transferred to Daisy Corporate Services, part of the Daisy Group, months after Sungard went into administration.

According to some reports, Daisy Group has signed a deal to acquire the UK arm of Sungard, in a move that would see the company pick up Sungard's former customers, including major banks and other financial institutions.

However, a statement given to The Register by the administrators, Teneo Financial Advisory, merely states that some Sungard customers will be transferred to Daisy Corporate Services, and it is not clear how many are included this arrangement.

The latest version of FreeBSD, 13.1, was released this week for both 32 and 64-bit forms of x86, Arm, POWER – and 64-bit RISC-V.

FreeBSD is one of the oldest open-source Unixes that's still actively maintained and is directly descended from the original BSD Unix developed at the University of California at Berkeley in the 1970s: the Berkeley System Distribution.

Version 13.1 includes OpenZFS 2.1.4, OpenSSH 8.8p1, OpenSSL 1.1.1, support for newer Intel Wi-Fi chipsets, and defaults to UEFI in Amazon EC2.

The Register - Independent news and views for the tech community. Part of Situation Publishing

Biting the hand that feeds IT © 1998–2022