Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 15, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 15, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 15, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 15, 2025

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025

      Microsoft plans to lay off 3% of its workforce, reportedly targeting management cuts as it changes to fit a “dynamic marketplace”

      May 15, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      A cross-platform Markdown note-taking application

      May 15, 2025
      Recent

      A cross-platform Markdown note-taking application

      May 15, 2025

      AI Assistant Demo & Tips for Enterprise Projects

      May 15, 2025

      Celebrating Global Accessibility Awareness Day (GAAD)

      May 15, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025
      Recent

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Chinese Hackers Targeted Taiwanese Research Institute with ShadowPad and Cobalt Strike

    Chinese Hackers Targeted Taiwanese Research Institute with ShadowPad and Cobalt Strike

    August 1, 2024

    Researchers have uncovered a cyber espionage campaign targeting a Taiwanese government-affiliated research institute specializing in computing and related technologies. The researchers assessed with medium confidence that the tactics, techniques, and procedures (TTPs) are associated with the Chinese state-sponsored hacking group known as APT41, which has been listed among the FBI’s most wanted in connection with intrusion campaigns against more than 100 victims globally.

    The campaign, which began as early as July 2023, utilized the notorious ShadowPad malware, Cobalt Strike, and other custom tools for post-compromise activities.

    Espionage Campaign Evidence Points to APT41

    The attack began with the exploitation of an outdated vulnerable version of Microsoft Office IME binary, which served as a loader to launch the second-stage loader for the payload. The ShadowPad malware, known for its remote access trojan (RAT) capabilities, was used to gain access to the system.

    Additionally, the researchers from Talos observed that APT41 had created a tailored loader to inject a proof-of-concept for CVE-2018-0824 directly into memory, utilizing the Microsoft remote code execution vulnerability to achieve local privilege escalation.

    The attackers also employed Cobalt Strike, a penetration testing tool, to evade detection by Windows Defender. A unique version of the commonly deployed Cobalt Strike loader, written in GoLang, was used to sideload the malware into the system.

    Source: https://blog.talosintelligence.com/

    This loader version was based on an anti-AV loader named CS-Avoid-Killing, hosted on GitHub and written in Simplified Chinese. The repository, promoted in Chinese hacking forums and technical tutorials, indicates that the threat actors were well-versed in the language. The use of Simplified Chinese in the loader’s code further strengthens the link to Chinese actors.

    The attackers compromised three hosts in the targeted environment and exfiltrated some documents from the network. They gained a foothold by executing malicious code and binaries on the machine, installing a webshell to enable discovery and execution, and dropping malware payloads through various approaches such as webshell, RDP access, and reverse shell.

    Once inside the network, the attackers employed tools like Mimikatz and WebBrowserPassView to steal credentials and exfiltrated sensitive documents using 7zip for compression and encryption.

    Several key indicators link this attack to APT41 beyond the use of Chinese-language in code and development of a custom loader based on one known in Chinese forums. One indicator is the deployment of ShadowPad by the attackers, a sophisticated modular RAT predominantly used by similar Chinese hacking groups.

    While the researchers could not retrieve the final ShadowPad payload, the loaders used match those previously attributed to the APT41 group. Also, significant infrastructure overlap exists, including the use of a command-and-control (C2) server previously linked to APT41 in a 2022 report.

    Finally, the attackers employed a specific side-loading technique leveraging an outdated Bitdefender executable, a tactic repeatedly observed in past APT41 campaigns.

    Sophisticated Tools and Techniques

    The attackers demonstrated a high degree of technical proficiency, using a variety of methods to establish a foothold and maintain persistence. They deployed webshells, leveraged RDP access, and established reverse shells to drop malware, including a unique Cobalt Strike loader written in GoLang, likely designed to evade Windows Defender.

    Chinese APT groups pose special risk to Taiwanese sovereignty and integrity as tensions and disputes between the two states grow.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMeeting the UK’s Telecommunications Security Act with MongoDB
    Next Article New Android RAT BingoMod Exploits Accessibility Services To Steal Money and Wipe Data

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4743 – Code-projects Employee Record System SQL Injection Vulnerability

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    DeepSim: AI-Accelerated 3D Physics Simulator for Engineers

    Development

    CVE-2025-32470 – Apache HTTP Server DNS Spoofing

    Common Vulnerabilities and Exposures (CVEs)

    On the 10th day of ‘Shipmas,’ OpenAI called, and ChatGPT answered — You can now add ChatGPT on speed dial or text it on WhatsApp

    Development

    OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking

    Development

    Highlights

    TypeScript vs JavaScript: Which One to Choose in 2025?

    February 18, 2025

    Comments Source: Read More 

    Exploring the Evolution and Impact of LLM-based Agents in Software Engineering: A Comprehensive Survey of Applications, Challenges, and Future Directions

    August 10, 2024

    Skip RTX 5080 — grab yourself a heavily discounted RTX 40-series laptop instead

    January 28, 2025

    CVE-2025-4559 – Netvision ISOinsight SQL Injection

    May 12, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.