CyberSecurity news

FlagThis

info@thehackernews.com (The Hacker News)@The Hacker News //
The Winnti Group, a China-based threat actor also known as APT41, is actively targeting Japanese organizations within the manufacturing, materials, and energy sectors. Researchers at LAC's Cyber Emergency Center identified a new campaign dubbed "RevivalStone," which employs an advanced version of the Winnti malware. This updated malware exhibits enhanced capabilities and sophisticated evasion techniques, posing a significant threat to the targeted industries.

This RevivalStone campaign initiates by exploiting SQL injection vulnerabilities in web-facing Enterprise Resource Planning (ERP) systems. Attackers deploy web shells like China Chopper to gain initial access, enabling reconnaissance, credential harvesting, and lateral movement within targeted networks. The updated Winnti malware variant features AES and ChaCha20 encryption, device-specific decryption keys using IP and MAC addresses, a kernel-level rootkit for covert data exfiltration, and code obfuscation to evade endpoint detection and response (EDR) systems.
Original img attribution: https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGeWNKFsCurwnUB-hkVoPnr-j1Aihnf5o9wJ5z_uu_Yae13w4_iJM57lx7S9NysrtMbDCpgwEmy6k0ZCYl6SKGMQPQSjyKPbnY5Rma3P6aSqFzn8AJbzMHNdRJ2Upz4IZmR32cfyawvp_mHhGE-RSHrOrutruXpYnZqvuU_39N1oFb8jdMJruuHEeECCMx/s728-rw-e365/hackers.png
ImgSrc: blogger.googleu

Share: bluesky twitterx--v2 facebook--v1 threads


References :
  • www.lac.co.jp: Researchers from LAC's Cyber Emergency Center analyze the "RevivalStone" campaign operated by China-based threat group Winnti
  • cyberpress.org: Winnti Hackers Target Japanese Organizations with Advanced Malware
  • Talkback Resources: The content provides an in-depth analysis of the Winnti Group's activities, including the RevivalStone campaign, tools used such as WinntiWebShell and China Chopper, and techniques like AES encryption, Winnti RAT, and Winnti Rootkit, with a focus on detection and prevention strategies.
  • Virus Bulletin: Researchers from LAC's Cyber ​​Emergency Center analyse the "RevivalStone" campaign operated by China-based threat group Winnti
  • securityaffairs.com: SecurityAffairs: China-linked APT group Winnti targets Japanese organizations since March 2024
  • The Hacker News: Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
  • Talkback Resources: China-linked APT group Winnti targeted Japanese organizations
  • Talkback Resources: Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
  • www.scworld.com: Winnti attacks set sights on Japan
Classification:
  • HashTags: #APT41 #CyberEspionage #Winnti
  • Company: LAC
  • Target: Japanese organizations
  • Attacker: Winnti
  • Feature: data theft
  • Malware: Winnti, RevivalStone
  • Type: APT
  • Severity: Major