A new attack sample from the OceanLotus group (APT32) has been identified on July 10 2024 by Knowsec 404. This sample uses topics related to social security and housing fund adjustments to lure victims into clicking malicious links. The tactics and methodologies of this sample bear a strong resemblance to those observed in a 2023 campaign where OceanLotus mimicked APT29’s attack strategies.
OceanLotus, also known as APT32, is a prominent Advanced Persistent Threat (APT) group active since 2012. This group primarily targets government agencies, corporations, media outlets, and activists in East and Southeast Asia. Known for its diverse attack techniques, OceanLotus employs a mix of custom-developed tools and open-source utilities to achieve its objectives at various stages of their operations.
The identified attack chain is structured as follows:
The LNK file is the initial payload that triggers the attack chain. It uses ShellExec to run CMD commands, which ensure the absence of security software and copy itself to a specific location before launching via mshta.exe
.
Stored within the LNK file, the HTA script executes several tasks:
The dropper decrypts and launches the Cobalt Strike payload. Cobalt Strike is a versatile penetration testing tool frequently used by APT groups. It allows attackers to deploy “Beacons” on compromised machines, enabling a wide range of malicious activities such as command execution, file transfer, and privilege escalation.
Analysis indicates that the techniques used in this attack are consistent with those from a 2023 campaign by OceanLotus, which used BMW-themed lures. Similarities include the format of LNK parameters and Cobalt Strike configuration files.
f04971c65d68319fbe1285b4a83afed6
(QuickDeskBand.dll)The recent sample captured by the Maltiverse Research Team highlights the continuous threat posed by OceanLotus. Their use of sophisticated techniques and tools like Cobalt Strike underscores the need for vigilant cybersecurity measures.
For more detailed analysis and updates on this and other cybersecurity threats, follow the Maltiverse Research Team’s ongoing research.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |