Carding Forum
Professional
- Messages
- 2,788
- Reaction score
- 1,334
- Points
- 113
Chinese hackers have spent years honing their skills to steal business secrets stealthily.
The China-linked APT41 group is suspected of using an "enhanced version" of the well-known StealthVector malware to deliver a new backdoor called MoonWalk. The new StealthVector variant was codenamed DodgeBox by Zscaler specialists, who discovered it in April 2024.
DodgeBox is a downloader that downloads the new MoonWalk backdoor. Security researchers Yin Hong Chang and Sudip Singh noted that MoonWalk uses a variety of DodgeBox-like evasion techniques and uses Google Drive for C2 communications.
According to experts, APT41 has been operating since at least 2007. It is also known by other names, such as Axiom, Blackfly, and Brass Tour. In September 2020, the US Department of Justice announced charges against several members of this group for hacking more than 100 companies around the world. These attacks contributed to the theft of source code, software signing certificates, customer account data, and important business information.
Over the past few years, APT41 has been linked to multiple breaches of US state government networks, as well as attacks on Taiwanese media organizations using the GC2 tool. The use of StealthVector by this group was first documented by Trend Micro in August 2021. This loader is written in C / C++ and is used to deliver Cobalt Strike Beacon and other malware.
DodgeBox is considered an improved version of StealthVector, including techniques such as call stack spoofing, DLL Sideloading, and DLL Hollowing to evade detection. Methods of distributing this malware are still unknown.
Researchers report that APT41 uses the Sideloading DLL to execute DodgeBox, using a legitimate executable file (taskhost.exe) signed by Sandboxie to download the malicious library (sbiedll.dll). DodgeBox is a DLL loader written in C that decrypts and runs the second stage of loading — the MoonWalk backdoor.
The attribution of DodgeBox to APT41 is based on the program's similarity to StealthVector, the use of Sideloading DLLs, and the fact that DodgeBox samples were sent to VirusTotal from Thailand and Taiwan.
The researchers note that DodgeBox is a new malicious downloader that uses a variety of techniques to evade detection and offers various capabilities, including decrypting and loading embedded DLLs, checking the environment, and performing cleaning procedures.
As cybercriminals continue to develop their tools to circumvent existing defenses, organizations should pay more attention to monitoring and updating their security systems to counter these ever-evolving threats.
Source
The China-linked APT41 group is suspected of using an "enhanced version" of the well-known StealthVector malware to deliver a new backdoor called MoonWalk. The new StealthVector variant was codenamed DodgeBox by Zscaler specialists, who discovered it in April 2024.
DodgeBox is a downloader that downloads the new MoonWalk backdoor. Security researchers Yin Hong Chang and Sudip Singh noted that MoonWalk uses a variety of DodgeBox-like evasion techniques and uses Google Drive for C2 communications.
According to experts, APT41 has been operating since at least 2007. It is also known by other names, such as Axiom, Blackfly, and Brass Tour. In September 2020, the US Department of Justice announced charges against several members of this group for hacking more than 100 companies around the world. These attacks contributed to the theft of source code, software signing certificates, customer account data, and important business information.
Over the past few years, APT41 has been linked to multiple breaches of US state government networks, as well as attacks on Taiwanese media organizations using the GC2 tool. The use of StealthVector by this group was first documented by Trend Micro in August 2021. This loader is written in C / C++ and is used to deliver Cobalt Strike Beacon and other malware.
DodgeBox is considered an improved version of StealthVector, including techniques such as call stack spoofing, DLL Sideloading, and DLL Hollowing to evade detection. Methods of distributing this malware are still unknown.
Researchers report that APT41 uses the Sideloading DLL to execute DodgeBox, using a legitimate executable file (taskhost.exe) signed by Sandboxie to download the malicious library (sbiedll.dll). DodgeBox is a DLL loader written in C that decrypts and runs the second stage of loading — the MoonWalk backdoor.
The attribution of DodgeBox to APT41 is based on the program's similarity to StealthVector, the use of Sideloading DLLs, and the fact that DodgeBox samples were sent to VirusTotal from Thailand and Taiwan.
The researchers note that DodgeBox is a new malicious downloader that uses a variety of techniques to evade detection and offers various capabilities, including decrypting and loading embedded DLLs, checking the environment, and performing cleaning procedures.
As cybercriminals continue to develop their tools to circumvent existing defenses, organizations should pay more attention to monitoring and updating their security systems to counter these ever-evolving threats.
Source