FireEye Says China-Based Hacker Group Now Targeting Firms in India

Advertisement
By Indo-Asian News Service | Updated: 10 April 2017 17:37 IST

Raising an alarm for the IT service providers and manufacturing companies in India, US-based cyber-security group FireEye has claimed that a new set of tools is being used by China-based cyber espionage group APT10 to steal confidential business data from domestic firms to support Chinese corporations.

FireEye has been tracking APT10 since 2009 and they have historically targeted construction, engineering, aerospace, telecom firms and governments in the US, Europe and Japan.

Advertisement

"IT services have been a core engine of India's economic growth, with service providers here scaling the value chain to manage business-critical functions of top global organisations. Campaigns like this highlight risks which all organisations should factor into their operations," said Kaushal Dalal, Managing Director, FireEye, India, in a statement on Monday.

APT10 activity has included both traditional spear phishing and access to victim's networks through service providers.

Advertisement

Service providers have significant access to customer networks, enabling an attacker who had compromised a service provider to move laterally into the network of the service provider's customer.

"Targeting of these industries has been in support of Chinese national security goals, including acquiring valuable military and intelligence information as well as the theft of confidential business data to support Chinese corporations," said FireEye in an earlier blog post.

Advertisement

In addition, web traffic between a service provider's customer and a service provider is likely to be viewed as benign by network defenders at the customer, allowing the attacker to exfiltrate data stealthily.

APT10 unveiled new tools in its 2016/2017 activity.

Advertisement

"HAYMAKER" and "SNUGRIDE" have been used as first-stage backdoors, while "BUGJUICE" and a customised version of the open source "QUASARRAT" have been used as second stage backdoors.

These new pieces of malware show that APT10 is devoting resources to capability development and innovation.

HAYMAKER is a backdoor that can download and execute additional payloads in the form of modules. BUGJUICE, also a backdoor, executed by launching a benign file and then hijacking the search order to load a malicious dll into it.

That malicious dll then loads encrypted shellcode from the binary, which is decrypted and runs the final BUGJUICE payload.

BUGJUICE defaults to TCP using a custom binary protocol to communicate with the C2, but can also use HTTP and HTTPs if directed by the C2. It has the capability to find files, enumerate drives, exfiltrate data, take screenshots and provide a reverse shell.

SNUGRIDE communicates with its C2 server through HTTP requests. Messages are encrypted using AES with a static key.

The malware's capabilities include taking a system survey, access to the filesystem, executing commands and a reverse shell. Persistence is maintained through a Run registry key, the post added.

QUASARRAT is a fully functional .NET backdoor that has been used by multiple cyber espionage groups in the past.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 15T Arrives With Dual 50-Megapixel Cameras at This Price
  2. Realme 16 5G Key Specifications, Features Revealed Ahead of India Launch
  3. Vivo Y21 5G, Vivo Y11 5G Arrive With 6,500mAh Batteries: See Price in India
  4. Apple's Latest iPhone Update Adds AI-Generated Playlists in Apple Music
  5. Samsung Galaxy A37, Galaxy A57 5G Price in India Tipped Ahead of Launch
  6. OnePlus Could Be Working on Android Handheld Console
  7. OpenAI Will Soon Shut Down the Popular AI Video-Generating Sora App
  1. Resort Streaming Now on JioHotstar: All You Need to Know About This Tamil Web Series Online
  2. Couple Friendly Now on OTT: Where to Watch This Love Story Online?
  3. iQOO Neo 11 Pro, Neo 11 Pro+ Tipped to Feature 2K Screen and 8,000mAh+ Battery
  4. Bitcoin, Ethereum Trade in Narrow Range as Market Awaits Breakout Signal
  5. Samsung Galaxy Z Fold 8 Design Spotted in Leaked Renders; Could Be Marginally Thinner Than Predecessor
  6. Realme P4 Lite 5G Goes on Sale in India for the First Time: Price, Specifications, Sale Offers
  7. Vivo Y21 5G and Vivo Y11 5G Launched in India With 6,500mAh Batteries, Dimensity 6300 SoC: Price, Features
  8. Meta Partners With Arm to Build Chipsets for AI Workloads, Unveils Arm AGI CPU
  9. Apple Preparing Major Siri Overhaul With Standalone App, New Interface, Contextual AI Features: Report
  10. Samsung Galaxy S26 Ultra Teardown Video Reveals Repairability Score; Falls Behind the iPhone 17 Pro
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.