• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Internet

Facebook says hackers backed by Vietnam’s government are linked to IT firm

December 11, 2020
Share on FacebookShare on Twitter

Facebook said it has linked an advanced hacking group widely believed to be sponsored by the government of Vietnam to what’s purported to be a legitimate IT company in that country.

The so-called advanced persistent threat group goes under the monikers APT32 and OceanLotus. It has been operating since at least 2014 and targets private sector companies in a range of industries along with foreign governments, dissidents, and journalists in South Asia and elsewhere. It uses a variety of tactics, including phishing, to infect targets with fully featured desktop and mobile malware that’s developed from scratch. To win targets’ confidence, the group goes to great lengths to create websites and online personas that masquerade as legitimate people and organizations.

Earlier this year, researchers uncovered at least eight unusually sophisticated Android apps hosted in Google Play that were linked to the hacking group. Many of them had been there since at least 2018. OceanLotus repeatedly bypassed Google’s app-vetting process, in part by submitting benign versions of the apps and later updating them to add backdoors and other malicious functionality.

FireEye published this detailed report on OceanLotus in 2017, and BlackBerry has more recent information here.

On Thursday, Facebook identified Vietnamese IT firm CyberOne Group as being linked to OceanLotus. The group lists an address in Ho Chi Minh city.

Email sent to the company seeking comment returned an error message that said the email server was misconfigured. A report from Reuters on Friday, however, quoted a person operating the company’s now-suspended Facebook page as saying: “We are NOT Ocean Lotus. It’s a mistake.”

At the time this post went live, the company’s website was also unreachable. An archive of it from earlier on Friday is here.

A recent investigation, Facebook said, uncovered a variety of notable tactics, techniques and procedures including:

  • Social engineering: APT32 created fictitious personas across the Internet posing as activists and business entities or used romantic lures when contacting people they targeted. These efforts often involved creating backstops for these fake personas and fake organizations on other Internet services so they appear more legitimate and can withstand scrutiny, including by security researchers. Some of their Pages were designed to lure particular followers for later phishing and malware targeting.
  • Malicious Play Store apps: In addition to using Pages, APT32 lured targets to download Android applications through Google Play Store that had a wide range of permissions to allow broad surveillance of people’s devices.
  • Malware propagation: APT32 compromised websites and created their own to include obfuscated malicious javascript as part of their watering hole attack to track targets’ browser information. A watering hole attack is when hackers infect websites frequently visited by intended targets to compromise their devices. As part of this, the group built custom malware capable of detecting the type of operating system a target uses (Windows or Mac) before sending a tailored payload that executes the malicious code. Consistent with this group’s past activity, APT32 also used links to file-sharing services where they hosted malicious files for targets to click and download. Most recently, they used shortened links to deliver malware. Finally, the group relied on Dynamic-Link Library (DLL) side-loading attacks in Microsoft Windows applications. They developed malicious files in exe, rar, rtf and iso formats, and delivered benign Word documents containing malicious links in text.
Advertisement

The naming of CyberOne Group isn’t the first time researchers have publicly linked a government-backed hacking group to real-world organizations. In 2013, researchers from Mandiant, now a part of security firm FireEye, identified a 12-story office tower in Shanghai, China, as the nerve center for Comment Crew, a hacking group that was responsible for hacks on more than 140 organizations over the previous seven years. The building was the headquarters for the People’s Liberation Army Unit 61398.
And in 2018, FireEye said that potentially life-threatening malware that tampered with the safety mechanisms of an industrial facility in the Middle East was developed at a research lab in Russia.

Facebook said it was removing the ability of OceanLotus to abuse the company’s platform. Facebook said it expected the group’s tactics to evolve but that improved detection systems will make it harder for the group to evade exposure.

Thursday’s report provides no specifics about how Facebook linked OceanLotus to CyberOne Group, making it hard for outside researchers to corroborate the finding. Facebook told Reuters that providing those details would provide the attackers and others like them with information that would allow them to evade detection in the future.

Next Post

The difference between human and machine intelligence

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Best gaming monitor deal: ASUS ROG Strix OLED $200 off
  • The best Mario Day Deals we found for your Nintendo Switch
  • Breakout Ventures closes $114m Fund III
  • NotebookLM is getting better at handling your e-books
  • Jimmy Kimmel slams Fox News for hypocritical response to recent Trump appearance

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously