Researchers Discover Advanced Backdoor and Custom Implant in Year-Long Cyber Operation

May 15, 2023
Cyber Threat / Malware

A fresh cyber threat has emerged, targeting government, aviation, education, and telecom sectors across South and Southeast Asia. This campaign, linked to a newly identified hacking group, began in mid-2022 and extended into early 2023. Symantec, a division of Broadcom Software, has dubbed this activity “Lancefly,” identifying a sophisticated backdoor known as Merdoor. Investigation reveals that this custom implant may have been in use as early as 2018. The campaign’s objectives appear to focus on intelligence gathering, given the tools employed and the specific targets chosen. According to Symantec’s analysis shared with The Hacker News, “The backdoor is deployed very selectively, impacting only a limited number of networks and devices over the years, indicating a highly targeted approach.” Additionally, the attackers appear to possess an updated version of the ZXShell rootkit.

Researchers Identify Sophisticated Backdoor and Custom Implant Amid Extended Cyber Campaign

May 15, 2023

A newly identified hacking group has executed a sustained cyber campaign impacting key sectors including government, aviation, education, and telecommunications across South and Southeast Asia. This operation, which began in mid-2022 and persisted into early 2023, has been under scrutiny by Symantec, a division of Broadcom Software, which is tracking the group’s activities under the name Lancefly.

Central to this campaign is a formidable backdoor, dubbed Merdoor, which has shown signs of use dating back to 2018. The evidence collected thus far suggests that the deployment of such sophisticated tools is carefully orchestrated, as the backdoor appears selectively across a limited number of networks and machines over the years. This indicates a highly targeted approach, with the primary objective inferred to be intelligence gathering. Symantec’s analysis, shared with The Hacker News, emphasizes the selective nature of the backdoor’s usage, reinforcing its utility for specific operations rather than indiscriminate attacks.

In addition to Merdoor, attackers have utilized an upgraded version of the ZXShell rootkit, further enhancing their capabilities. This intricate blend of tools reflects a methodical approach consistent with complex cyber operations aimed at extensive information reconnaissance. The specificity of the targets underscores a strategic emphasis on sectors critical to national infrastructure and information control.

This operation aligns with several techniques identified in the MITRE ATT&CK framework, particularly in terms of initial access and persistence strategies. The attackers likely employed tactics such as spear phishing or exploiting known vulnerabilities to gain entry. Once inside, they could have maintained their presence through advanced persistence mechanisms, ensuring prolonged access to sensitive information while minimizing detection.

Privilege escalation methods may also have been leveraged, allowing adversaries to elevate their access rights within compromised environments. These tactics showcase an understanding of cybersecurity defenses and reflect a disciplined adherence to operational security, making them particularly challenging to mitigate.

As the situation develops, business leaders within the affected sectors should remain vigilant. The targeted nature of this campaign highlights the critical need for proactive cybersecurity measures and a robust understanding of potential threats. Adopting a comprehensive risk management strategy that encompasses threat intelligence sharing and regular security assessments can significantly enhance defensive capabilities. The implications of this campaign serve as a stark reminder of the evolving threats within the digital landscape and the continuous necessity for vigilance in cybersecurity practices.

Organizations must prioritize a culture of security awareness, equipping their workforce with knowledge of social engineering tactics and reinforcing the importance of immediate reporting of suspicious activities. As the nature of cyber threats continues to grow in complexity and sophistication, adopting a multi-layered defense approach is essential for safeguarding sensitive information and assets against future incursions.

Source link