Security Experts:

Connect with us

Hi, what are you looking for?


Application Security

Chinese Hackers Target Government Entities in Widespread Campaign

A newly uncovered advanced persistent threat (APT) campaign is targeting a large number of users in South Asia, including government entities, according to a new report from anti-malware vendor Kaspersky.

A newly uncovered advanced persistent threat (APT) campaign is targeting a large number of users in South Asia, including government entities, according to a new report from anti-malware vendor Kaspersky.

Dubbed LuminousMoth, the activity involves cyberespionage attacks on governments since at least October 2020 but, unlike similar attacks that are highly targeted, this campaign stands out due to its size: roughly 100 victims in Myanmar and 1,400 in the Philippines.

The main focus of the attacks, however, was only a subset of victims that included high-profile organizations, including government entities both within the two countries and abroad.

The threat actor uses spear-phishing emails as the initial assault vector. The emails include a Dropbox download link that fetches a RAR archive posing as a Word document that deploy malware onto target machines.

The malware can spread to other systems through removable USB drives, on which it creates hidden directories and malicious executables.

[ Related: New Law Will Help Chinese Government Stockpile Zero-Days ]

In some cases, two other tools were used for lateral movement: a signed, but fake version of Zoom that was actually malware designed to steal data files; and a second tool to steal Chrome browser cookies. All of the harvested data is exfiltrated to the adversary’s command and control (C&C) server.

“The sheer volume of the attacks raises the question of whether this is caused by a rapid replication through removable devices or by an unknown infection vector, such as a watering hole or a supply chain attack,” Kaspersky said in a published report.

Kaspersky assesses with medium to high confidence that LuminousMoth is related to the HoneyMyte threat group, a Chinese-speaking threat actor known for its focus on gathering geopolitical and economic intelligence in Asia and Africa.

Both LuminousMoth and HoneyMyte have similar TTPs, including the use of DLL side-loading and Cobalt Strike loaders, a component of the Chrome browser cookie stealer was observed in previous HoneyMyte activity, and Kaspersky also discovered infrastructure overlaps between the two.

“This new cluster of activity might once again point to a trend we’ve been witnessing over the course of this year: Chinese-speaking threat actors re-tooling and producing new and unknown malware implants,” said Mark Lechtik, senior security researcher with Kaspersky’s Global Research and Analysis Team (GReAT).

Related: New Law Will Help Chinese Government Stockpile Zero-Days

Related: Chinese Hackers Using Previously Unknown Backdoor

Related: Chinese Cyberspies Target Military Organizations in Asia With New Malware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...