Executive Summary
The Chinese APT group Earth Estries has been linked to sophisticated cyberattacks on telecommunications and other industries across 12+ countries using the new GHOSTSPIDER malware. Leveraging advanced tactics and a range of custom tools, Earth Estries has successfully conducted long-term espionage, highlighting the maturation of China’s cyber operations.
Main Points
-
Attack Scope:
- Earth Estries has targeted telecommunications, government networks, and industries like technology, consulting, chemical, and transportation.
- Victims span 12+ countries, including the U.S., India, Indonesia, Malaysia, and South Africa, with over 20 entities compromised and 150 notified victims in the U.S. alone.
-
Malware and Tools:
- Key tools include GHOSTSPIDER, Demodex rootkit, and Deed RAT (successor to ShadowPad).
- Additional malware families used include Crowdoor, SparrowDoor, HemiGate, TrillClient, and Zingdoor.
- The malware employs a custom protocol with TLS for secure communication and modular updates for flexible functionality.
-
Exploitation Methods:
- Earth Estries exploits known security flaws (N-day vulnerabilities) in systems like Ivanti Connect Secure, Fortinet FortiClient EMS, Sophos Firewall, and Microsoft Exchange (e.g., ProxyLogon).
- These flaws allow initial access, paving the way for deploying custom malware for espionage.
-
Operational Sophistication:
- The group demonstrates a high level of organization, with specialized teams for different regions, industries, and infrastructure management.
- Attacks extend from edge devices to cloud environments, using stealth techniques to evade detection.
-
Broader Context:
- Earth Estries is associated with other APT clusters like FamousSparrow, GhostEmperor, and UNC2286.
- This reflects a shift in China’s cyber strategy from isolated attacks to bulk data collection and long-term targeting of Managed Service Providers (MSPs) and Internet Service Providers (ISPs).
-
Key Takeaway:
- The campaign underlines the evolving threat posed by Chinese cyber actors and the critical need for organizations to address known vulnerabilities, enhance monitoring, and adopt robust cybersecurity practices.
Original Link: Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries
12ft.io Link: https://12ft.io/https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
Archive.org Link: https://web.archive.org/web/https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
User Message: Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries
for more on see the post on bypassing methods