Patchwork Hackers Target Chinese Universities and Research Institutions Using EyeShell Backdoor

Date: July 31, 2023
Category: Cyber Espionage / Malware

A recent campaign has revealed that the hacking group known as Patchwork is actively targeting universities and research organizations in China. According to the KnownSec 404 Team, these attacks leverage a backdoor named EyeShell. Also referred to as Operation Hangover or Zinc Emerson, Patchwork is believed to operate on behalf of India and has been active since at least December 2015. Their attacks primarily focus on Pakistan and China, employing custom malware such as BADNEWS, typically via spear-phishing and watering hole techniques. This group exhibits tactical similarities with other Indian-affiliated cyber-espionage collectives, like SideWinder and the DoNot Team. In a related development, Meta announced in May that it had suspended 50 accounts on Facebook and Instagram connected to Patchwork, which exploited rogue messaging apps.

Patchwork Hackers Target Chinese Research Institutions with EyeShell Backdoor

On July 31, 2023, cybersecurity analysts from the KnownSec 404 Team reported that cyber espionage threats linked to a group known as Patchwork have been actively targeting universities and research organizations across China. This campaign is marked by the deployment of a sophisticated backdoor identified as EyeShell, which underscores the growing sophistication of digital threats aimed at research entities.

Patchwork, also recognized by alternate names such as Operation Hangover and Zinc Emerson, is suspected to operate under the auspices of Indian interests. The group has been active since at least December 2015, employing narrow yet focused attack strategies primarily directed at Pakistan and China. This targeting is often accomplished through tailored malware, such as the known BADNEWS implant, delivered via methods like spear-phishing and watering hole attacks.

The group’s modus operandi reveals a distinct pattern of utilizing customized implants to compromise their chosen targets. The collaboration of tactical approaches with other Indian-associated cyber-espionage entities, such as SideWinder and the DoNot Team, further emphasizes the strategic coordination of these threat actors in advancing their espionage goals.

In a separate but related incident earlier this May, Meta took measures to dismantle 50 social media accounts on Facebook and Instagram that were reportedly operated by Patchwork. These accounts manipulated messaging apps that were inadvertently uploaded to the platforms, illustrating a common tactic within the group’s operational playbook.

In analyzing their latest campaign, it is crucial to consider the tactics and techniques employed within the framework of the MITRE ATT&CK Matrix. Initial access may have been achieved through phishing techniques, wherein malicious links or attachments trick users into compromising their own systems. The persistence of malware like EyeShell indicates that methods of establishing long-term footholds within targeted networks were effectively utilized, thereby allowing unauthorized access over an extended duration.

Privilege escalation may have also played a role, enabling attackers to gain higher levels of access and control over critical systems and sensitive data. The use of watering hole attacks suggests a strategic selection of compromised sites frequented by the intended targets, further enhancing their chances of incursion.

As cyber threats continue to evolve, understanding the techniques and tactics utilized by groups like Patchwork is essential for business owners and cybersecurity professionals alike. Keeping abreast of these developments is vital for enhancing the security posture of organizations, particularly those engaged in research that may attract such espionage activities.

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *