• Cyber Syrup
  • Posts
  • Chinese and North Korean Hackers Target Critical Infrastructure Worldwide

Chinese and North Korean Hackers Target Critical Infrastructure Worldwide

China and North Korea have been linked to ransomware and data encryption attacks targeting government and critical infrastructure sectors worldwide

CYBER SYRUP
Delivering the sweetest insights on cybersecurity.

Chinese and North Korean Hackers Target Critical Infrastructure Worldwide

Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting government and critical infrastructure sectors worldwide. These activities, associated with groups like ChamelGang (aka CamoFei) and others, have raised significant concerns about cybersecurity and international security.

Who is Behind These Attacks?

Two main clusters of activity have been identified by cybersecurity firms SentinelOne and Recorded Future. One cluster involves ChamelGang, while the second overlaps with activities attributed to Chinese and North Korean state-sponsored groups.

ChamelGang's Activities

ChamelGang, first documented by Positive Technologies in 2021, is believed to be a China-nexus group with varied motivations such as intelligence gathering, data theft, financial gain, denial-of-service (DoS) attacks, and information operations. ChamelGang has been linked to attacks on the All India Institute of Medical Sciences (AIIMS) and the Presidency of Brazil in 2022 using CatB ransomware. Other targets include a government entity in East Asia and an aviation organization in the Indian subcontinent.

The group's arsenal includes tools like BeaconLoader, Cobalt Strike, backdoors such as AukDoor and DoorMe, and CatB ransomware. These tools have been used in attacks targeting Brazil and India, characterized by commonalities in ransom notes, contact email formats, cryptocurrency wallet addresses, and encrypted file extensions.

Broader State-Sponsored Activities

The second cluster of intrusions involves the use of Jetico BestCrypt and Microsoft BitLocker in cyber attacks across various industry verticals in North America, South America, and Europe. These activities are consistent with those attributed to Chinese hacking crew APT41 and North Korean actor Andariel, involving tools like the China Chopper web shell and the DTrack backdoor. As many as 37 organizations, predominantly in the U.S. manufacturing sector, have been targeted.

Who is at Risk?

The primary targets of these cyber threats include government agencies, critical infrastructure sectors, and various industry verticals across multiple continents. Specific incidents have involved:

  • The All India Institute of Medical Sciences (AIIMS)

  • The Presidency of Brazil

  • Government entities in East Asia

  • Aviation organizations in the Indian subcontinent

  • U.S. manufacturing sectors

The executives and senior leadership roles within these organizations, as well as IT departments managing cybersecurity defenses, are particularly at risk. The broader international community must also remain vigilant against such threats.

How to Protect Yourself

Organizations can take several steps to protect themselves against these sophisticated cyber threats:

Strengthen Cybersecurity Measures

  1. Update and Patch Systems Regularly: Ensure all software, including operating systems and applications, are up-to-date with the latest security patches to mitigate vulnerabilities.

  2. Use Advanced Threat Detection Tools: Deploy advanced threat detection and response tools to identify and mitigate potential threats in real-time.

  3. Implement Multi-Factor Authentication (MFA): Strengthen user authentication processes by implementing MFA to add an extra layer of security.

  4. Conduct Regular Security Audits: Perform regular security audits and vulnerability assessments to identify and address potential security gaps.

Educate and Train Employees

  1. Cybersecurity Training: Provide regular cybersecurity training to employees to help them recognize and respond to phishing attempts and other social engineering tactics.

  2. Incident Response Planning: Develop and regularly update incident response plans to ensure quick and effective responses to security breaches.

Collaborate with Cybersecurity Experts

  1. Engage Cybersecurity Firms: Collaborate with reputable cybersecurity firms to gain insights into the latest threats and receive expert guidance on strengthening defenses.

  2. Participate in Information Sharing Networks: Join cybersecurity information sharing networks to stay informed about emerging threats and best practices.

Conclusion

The cyber threats from state-sponsored groups in China and North Korea represent a significant risk to global security, targeting critical infrastructure and government sectors. By understanding the nature of these threats and implementing robust cybersecurity measures, organizations can better protect themselves and mitigate the impact of potential attacks. The distinction between criminal hacking and legitimate security research is crucial, as ethical practices in cybersecurity contribute to a safer digital environment for all.