Security

Japanese police claim China ran five-year cyberattack campaign targeting local orgs

‘MirrorFace’ group found ways to run malware in the Windows sandbox, which may be worrying


Japan’s National Police Agency and Center of Incident Readiness and Strategy for Cybersecurity have confirmed third party reports of attacks on local orgs by publishing details of a years-long series of attacks attributed to a China-backed source.

The agencies have named the actor “MirrorFace”, aka “Earth Kasha”, and outlined a campaign they allege started in 2019 and saw at least three waves of attack that continued into 2024. The agencies’ report follows similar allegations raised last year by infosec vendors Trend Micro and Broadcom. The alleged attacker has also been linked to the APT 10 gang.

The first wave of attacks ran from December 2019 to July 2023 and saw phishing emails sent to targets at think tanks, government agencies, politicians, and media organizations. The messages sometimes included malware in attached files, while others initiated conversations in which the sender offered to send info pursuant to the topic at hand and instead sent malware named “LODEINFO”, “LilimRAT” and “NOOPDOOR”. All are known malware strains.

A second campaign ran from February 2023 into mid-2024 and saw attackers exploit known weaknesses in TLS 1.0, use client certificates that they somehow obtained to authenticate, and employ use SQL injection attacks. The attackers also apparently installed the Neo-reGeorg tunneling tool and open source WebShells on VPNs.

After the attacks, Japanese authorities observed abuse of Active Directory servers and unauthorized access to Microsoft 365. Machine translation of National Police docs suggests “unauthorized access to virtualization servers, and acquisition of virtual machine images” was another outcome. So was deployment of Cobalt Strike BEACON, LODEINFO, and NOOPDOOR malware.

Japan’s semiconductor, manufacturing, information and communications, academic, and aerospace sectors were the target of the second attack wave.

The third campaign kicked off in June 2024 and again involved phishing, this time to send documents that enabled Macros to run in Microsoft Office apps.

Again, the NOOPDOOR malware was dropped when possible, along with another strain called “ANEL” that’s thought to be a part of APT10’s armory. Academia, think tanks, politicians, and the media were among the targets.

Scarily, Japan’s investigators observed this campaign sometimes saw malware running in the Windows sandbox, the not-quite-a-VM Microsoft offers to run code in isolation within some versions of Windows 10 and 11. A Japanse-language document [PDF] explains that the malware took advantage of the fact that the Windows sandbox can be set to allow it to interact with a host machine, and that instructions from a command-and-control server drove sandboxed code to do so.

Anything in the Windows sandbox should disappear after system reboots, which hides attackers’ tracks nicely and means they can’t establish a persistent presence.

These miscreants may not have needed that ongoing access as it appears they used the access afforded by their various attacks and tools to exploit known vulnerabilities in Fortinet and Citrix products, enabling further forays.

Japanese authorities have urged local businesses to learn from the documentation it has provided about the attacks and harden their defenses.

That call may be too little, too late, as in 2018 – before this wave of attacks commenced – Google warned that ATP 10 had launched a new phishing campaign at Japanese targets, and had conducted similar campaigns since 2009. ®

Send us news
6 Comments

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

China to probe US chip subsidies as export curbs rattle allies

Beijing investigating claims of unfair competition in mature semiconductors

Hackers game out infowar against China with the US Navy

Taipei invites infosec bods to come and play on its home turf

Biden said to weigh global limits on AI exports in 11th-hour trade war blitz

China faces outright ban while others vie for Uncle Sam's favor

Akamai to quit its CDN in China, seemingly not due to trouble from Beijing

Security and cloud compute have so much more upside than the boring business of shifting bits

FireScam infostealer poses as Telegram Premium app to surveil Android devices

Once installed, it helps itself to your data like it's a free buffet

Microsoft invites Chinese software vendors to sell on its marketplace and through its partners

Good luck getting buyers and resellers excited about that

When food delivery apps reached Indonesia, everyone put on weight

PLUS: Salt Typhoon and IT worker scammers sanctioned; Alibaba Cloud’s K8s go global; Amazon acquires Indian BNPL company

Donald Trump proposes US government acquire half of TikTok, which thanks him and restores service

Incoming president promises to allow ongoing operations for 90 days just as made-in-China app started to go dark

Parallels brings back the magic that was waiting seven minutes for Windows to boot

In a preview of x86_64 VMs running on Apple silicon, so it’s excusable for now

Nvidia snaps back at Biden's 'innovation-killing' AI chip export restrictions

'New rule threatens to squander America's hard-won technological advantage' says GPU supremo

Now Trump's import tariffs could raise the cost of a laptop for Americans by 68%

Make America irate again