Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

South Korea-Linked Hackers Targeted Chinese Government via VPN Zero-Day

A threat actor linked to South Korea has launched attacks against Chinese government agencies using a zero-day vulnerability affecting a local VPN service, Chinese cybersecurity firm Qihoo 360 reported on Monday.

A threat actor linked to South Korea has launched attacks against Chinese government agencies using a zero-day vulnerability affecting a local VPN service, Chinese cybersecurity firm Qihoo 360 reported on Monday.

The threat group, tracked as DarkHotel, has been tied by some members of the industry to South Korea. Qihoo 360 does not directly accuse South Korea of being behind the attacks, but says the threat actor is located in the Korean Peninsula and notes that its victims include North Korea.

According to Qihoo 360, DarkHotel targeted many Chinese institutions starting in March. The attackers exploited a previously unknown security hole in the Sangfor VPN service to deliver backdoor malware.

Sangfor Technologies is a provider of IT infrastructure solutions with over 5,000 employees. The company is based in China, but it has offices all across Southeast Asia and an R&D center in the United States.

Qihoo and Sangfor said hackers exploited a zero-day vulnerability in the update process of VPN clients to replace legitimate updates with a backdoor. The Chinese cybersecurity firm said the attackers served the malware from roughly 200 compromised VPN servers.

Sangfor quickly took measures to block attacks after being notified, and the company has promised to release patches for the vulnerability in the upcoming days.

Qihoo reported that the attacks targeted organizations in China, as well as Chinese entities located in other countries, including Italy, UK, UAE, North Korea, Israel, Turkey, Malaysia, Iran, Saudi Arabia, India, Pakistan, Thailand, Indonesia, Ethiopia, Tajikistan, Kyrgyzstan and Afghanistan.

Qihoo believes the attack is likely related to the coronavirus outbreak and the hackers could aim to spy on “China’s medical technology and virus-control measures.”

Advertisement. Scroll to continue reading.

“Is it also possible that, by attacking Chinese overseas agencies, the group’s real purpose is to grasp the supply transport routes, quantity, and equipment of the quarantine materials that China sends to other countries around the world. What’s more, is it aiming at further probing into the medical data of the epidemic in more countries?” the company’s researchers said.

They added, “Another speculation is that the group may also want to know the relationships between China and other countries by analyzing the political and economic transactions data as well as the economic mitigation measures, so as to further promote the rise of the national economy and balance the interests of various countries after the pandemic.”

A few weeks ago, Qihoo 360 reported that DarkHotel had exploited zero-day vulnerabilities in Firefox and Internet Explorer in attacks aimed at Chinese government organizations. Japan also reported being targeted as part of the same campaign.

Google revealed recently that DarkHotel last year exploited five zero-day flaws in attacks launched mostly against targets in North Korea and individuals working on North Korea-related issues.

Related: Chrome Zero-Day Vulnerability Exploited in Korea-Linked Attacks

Related: ‘DarkHotel’ APT Uses New Methods to Target Politicians

Related: China-Linked Group Uses New Malware in Japan Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.