Inside a Chinese APT's very flexible playbook

(Getty images)


Written by

A maxim of cybersecurity holds that hackers will exert just enough resources to compromise a network or avoid detection. Why deploy new, top-shelf tools when you can just refashion old ones?

The strategy is on full display in research on a Chinese government-linked hacking group that Dell Technologies’ Secureworks published Wednesday. The hackers — categorized as an advanced persistent threat by researchers and usually labeled APT27 or Bronze Union — dusted off and upgraded a couple of long-available digital weapons to carry out intrusions in 2018, the report said.

“The threat actors have access to a wide range of tools, so they can operate flexibly and select tools appropriate for intrusion challenges,” the research says.

One remote access trojan (RAT) was developed over a decade ago, but Bronze Union added a packet redirection tool and digital certificates signed by two Chinese technology companies before deploying it last year, according to the research. The group also modified the well-known Gh0st RAT and used it on multiple systems to achieve its objective within a breached environment, Secureworks said.

“The fact that Secureworks observes the use of these tools nearly 13 years later by Bronze Union speaks to the effectiveness of this threat group,” Matthew Webster, senior security researcher at Secureworks Counter Threat Unit, told CyberScoop.

Bronze Union, the researchers said, was “one of the most prolific and active” hacking outfits they tracked in 2017 and 2018. In 2017, the group broke into a Mongolian national data center, allowing the hackers to plant malware on Mongolian government websites, CyberScoop has reported. And in the last three years, the group has targeted the networks of political, humanitarian, technology and manufacturing organizations, according to Secureworks.

The determination and ability to maintain prolonged access to a victim network is typical of hackers on a well-funded mission.

“After accessing a network, the threat actors are adept at circumventing common security controls, escalating privileges, and maintaining their access to high-value systems over long periods of time,” the Secureworks research says.

The report comes as the Trump administration has pressured China to curtail its alleged hacking for economic gain through a series of indictments and public condemnations. U.S. officials earlier this month warned companies about how another Chinese hacking group, known as APT10, has evolved in its alleged efforts to steal corporate data.

-In this Story-

APT27, China, Chinese hackers, Dell Secureworks, Matthew Webster, security research