A threat actor linked to South Korea has launched attacks against Chinese government agencies using a zero-day vulnerability affecting a local VPN service, Chinese cybersecurity firm Qihoo 360 reported on Monday.
The threat group, tracked as DarkHotel, has been tied by some members of the industry to South Korea. Qihoo 360 does not directly accuse South Korea of being behind the attacks, but says the threat actor is located in the Korean Peninsula and notes that its victims include North Korea.
According to Qihoo 360, DarkHotel targeted many Chinese institutions starting in March. The attackers exploited a previously unknown security hole in the Sangfor VPN service to deliver backdoor malware.
Sangfor Technologies is a provider of IT infrastructure solutions with over 5,000 employees. The company is based in China, but it has offices all across Southeast Asia and an R&D center in the United States.
Qihoo and Sangfor said hackers exploited a zero-day vulnerability in the update process of VPN clients to replace legitimate updates with a backdoor. The Chinese cybersecurity firm said the attackers served the malware from roughly 200 compromised VPN servers.
Sangfor quickly took measures to block attacks after being notified, and the company has promised to release patches for the vulnerability in the upcoming days.
Qihoo reported that the attacks targeted organizations in China, as well as Chinese entities located in other countries, including Italy, UK, UAE, North Korea, Israel, Turkey, Malaysia, Iran, Saudi Arabia, India, Pakistan, Thailand, Indonesia, Ethiopia, Tajikistan, Kyrgyzstan and Afghanistan.
Qihoo believes the attack is likely related to the coronavirus outbreak and the hackers could aim to spy on “China’s medical technology and virus-control measures.”
“Is it also possible that, by attacking Chinese overseas agencies, the group’s real purpose is to grasp the supply transport routes, quantity, and equipment of the quarantine materials that China sends to other countries around the world. What’s more, is it aiming at further probing into the medical data of the epidemic in more countries?” the company’s researchers said.
They added, “Another speculation is that the group may also want to know the relationships between China and other countries by analyzing the political and economic transactions data as well as the economic mitigation measures, so as to further promote the rise of the national economy and balance the interests of various countries after the pandemic.”
A few weeks ago, Qihoo 360 reported that DarkHotel had exploited zero-day vulnerabilities in Firefox and Internet Explorer in attacks aimed at Chinese government organizations. Japan also reported being targeted as part of the same campaign.
Google revealed recently that DarkHotel last year exploited five zero-day flaws in attacks launched mostly against targets in North Korea and individuals working on North Korea-related issues.
Related: Chrome Zero-Day Vulnerability Exploited in Korea-Linked Attacks
Related: ‘DarkHotel’ APT Uses New Methods to Target Politicians
Related: China-Linked Group Uses New Malware in Japan Attacks