Article Details
Scrape Timestamp (UTC): 2025-01-09 03:58:27.940
Source: https://www.theregister.com/2025/01/09/japan_mirrorface_china_attack/
Original Article Text
Click to Toggle View
Japanese Police claim China ran five-year cyberattack campaign. ‘MirrorFace’ group found ways to run malware in the Windows sandbox, which is worrying. Japan’s National Police Agency and Center of Incident Readiness and Strategy for Cybersecurity have confirmed third party reports of attacks on local orgs by publishing details of a years-long series of attacks attributed to a China-backed source. The agencies have named the actor “MirrorFace”, aka “Earth Kasha”, and outlined a campaign they allege started in 2019 and saw at least three waves of attack that continued into 2024. The agencies’ report follows similar allegations raised last year by infosec vendors Trend Micro and Broadcom. The alleged attacker has also been linked to the APT 10 gang. The first wave of attacks ran from December 2019 to July 2023 and saw phishing emails sent to targets at think tanks, government agencies, politicians, and media organizations. The messages sometimes included malware in attached files, while others initiated conversations in which the sender offered to send info pursuant to the topic at hand and instead sent malware named “LODEINFO”, “LilimRAT” and “NOOPDOOR”. All are known malware strains. A second campaign ran from February 2023 into mid-2024 and saw attackers exploit known weaknesses in TLS 1.0, use client certificates that they somehow obtained to authenticate, and employ use SQL injection attacks. The attackers also apparently installed the Neo-reGeorg tunneling tool and open source WebShells on VPNs. After the attacks, Japanese authorities observed abuse of Active Directory servers and unauthorized access to Microsoft 365. Machine translation of National Police docs suggests “unauthorized access to virtualization servers, and acquisition of virtual machine images” was another outcome. So was deployment of Cobalt Strike BEACON, LODEINFO, and NOOPDOOR malware. Japan’s semiconductor, manufacturing, information and communications, academic, and aerospace sectors were the target of the second attack wave. The third campaign kicked off in June 2024 and again involved phishing, this time to send documents that enabled Macros to run in Microsoft Office apps. Again, the NOOPDOOR malware was dropped when possible, along with another strain called “ANEL” that’s thought to be a part of APT10’s armory. Academia, think tanks, politicians, and the media were among the targets. Scarily, Japan’s investigators observed this campaign sometimes saw malware running in the Windows sandbox, the not-quite-a-VM Microsoft offers to run code in isolation within some versions of Windows 10 and 11. A Japanse-language document [PDF] explains that the malware took advantage of the fact that the Windows sandbox can be set to allow it to interact with a host machine, and that instructions from a command-and-control server drove sandboxed code to do so. Anything in the Windows sandbox should disappear after system reboots, which hides attackers’ tracks nicely and means they can’t establish a persistent presence. These miscreants may not have needed that ongoing access as it appears they used the access afforded by their various attacks and tools to exploit known vulnerabilities in Fortinet and Citrix products, enabling further forays. Japanese authorities have urged local businesses to learn from the documentation it has provided about the attacks and harden their defenses. That call may be too little, too late, as in 2018 – before this wave of attacks commenced – Google warned that ATP 10 had launched a new phishing campaign at Japanese targets, and had conducted similar campaigns since 2009.
Daily Brief Summary
Japan’s National Police Agency and Center of Incident Readiness and Strategy for Cybersecurity (CIRSC) have attributed a multiyear cyberattack campaign to the Chinese cyber espionage group "MirrorFace", also known as "Earth Kasha".
The campaign, reported to have started in 2019 and involving at least three distinct waves of attacks, targeted Japanese think tanks, government agencies, politicians, and media outlets using sophisticated malware like "LODEINFO", "LilimRAT", and "NOOPDOOR".
Attack methods included spear phishing to distribute malware, exploitation of TLS 1.0 vulnerabilities, SQL injection attacks, and misuse of client certificates, alongside deployment of tools like Neo-reGeorg tunneling and WebShells on compromised VPNs.
Notable malware techniques involved manipulating Microsoft Office apps to run harmful macros and leveraging the Windows sandbox feature to execute and erase signs of malware post-reboot, thus avoiding persistent detection.
Critical sectors such as semiconductor, manufacturing, information and communications, academia, and aerospace have been notably impacted, suffering from unauthorized access to systems like Microsoft 365 and exploitation of vulnerabilities in products from Fortinet and Citrix.
Japanese authorities have advised local enterprises to augment their cybersecurity defenses, referencing both the current campaign and earlier warnings issued by entities like Google about APT10's activities targeting Japan since 2009.