Phishing on the high seas: GroundPeony hackers fool their victims by masterfully forging links

Carding

Professional
Messages
2,870
Reaction score
2,511
Points
113
Your favorite URL shortening tool may be used against you.

Cybersecurity experts from the nao-sec discovered a large-scale cyberattack campaign targeting Taiwanese government organizations. The attacks are reportedly being carried out by a Chinese hacking group, which is being tracked by experts under the code name "GroundPeony". The group has a lot of similarities with the cybercrime group "UNC33471", so it is likely that we are talking about the same hackers.

7la33df9c8ynpz028ljdp280lqguzkc6.png

GroundPeony Attack Chain

In most attacks, GroundPeony exploits the CVE-2022-30190 vulnerability, codenamed Folina. The attack chain starts with sending a phishing email with an attached DOC file. As the subject of their phishing emails, the GroundPeony hackers used sea traffic between Taiwan and the United States to make them more convincing to the victim.

tuzdcplr7xqf39i8ptmtqek1i1izcu45.png

A harmless attachment with a "surprise" inside

When you run the attached file, the potential victim sees an error notification that the contents of the file cannot be viewed without installing a special update. The same "notification" contains a link to the supposedly official Microsoft website, where you can download the necessary update. But in fact, the directory belongs to fraudsters, and hackers used the link shortening service Cuttly to mask the URL.

t9qimnqst2qoaf2bmjmnb442sf3o8qbv.png

Link to the malware archive

The downloaded ZIP archive contains an executable EXE file and a DLL library for infecting your computer with malware. Running the program opens a channel for attackers to use to deliver any payload to a compromised device, whether it's infostealers, ransomware, vipers, or other malicious programs.

Analysis of the technical details of the attacks showed that the GroundPeony group has been operating since 2021 and is primarily aimed at government organizations in Taiwan and Nepal. Experts believe that hackers have a high level of skill and access to 0-day vulnerabilities.

Cybersecurity professionals whose organizations are at risk should strengthen their anti-phishing measures and carefully check suspicious files and links. However, only increased vigilance will definitely help you avoid becoming a victim of clever scammers.

(c) https://www.securitylab.ru/news/541176.php
 
Top