{"id":24461,"date":"2022-06-24T08:36:41","date_gmt":"2022-06-24T12:36:41","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=24461"},"modified":"2022-06-27T15:34:26","modified_gmt":"2022-06-27T19:34:26","slug":"chinese-groups-use-ransomware-as-lure-for-cyber-espionage","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/chinese-groups-use-ransomware-as-lure-for-cyber-espionage\/","title":{"rendered":"Chinese Groups Use Ransomware As Lure For Cyber Espionage"},"content":{"rendered":"<p id=\"arIndex_1\" data-ar-index=\"1\">Threat analysts from Secureworks have uncovered the activities of two Chinese hacking groups that use ransomware as a decoy for cyber espionage. Ransomware as a decoy allows attackers to cover their tracks, complicate attribution, and distract defenders.<\/p>\n<p id=\"arIndex_2\" data-ar-index=\"2\">The two cluster of hacker activities are &#8220;Bronze Riverside&#8221; (APT41), and &#8220;Bronze Starlight&#8221; (APT10). Both use the HUI Loader to deploy remote access trojans, PlugX, Cobalt Strike and QuasarRAT.<\/p>\n<p id=\"arIndex_3\" data-ar-index=\"3\">It is unclear whether these ransomware families were developed as decoys to hide other malicious activities. Nothing is certain, because all the discussed ransomware strains are based on publicly available leaked codes.<\/p>\n<p id=\"arIndex_4\" data-ar-index=\"4\">According to the researchers, &#8220;Bronze Starlight&#8221; may be creating short-lived ransomware strains just to disguise its cyber espionage operations as a ransomware attack. This is because the five ransomware strains (LockFile, AtomSilo, Rook, Night Sky and Pandora0 used during attacks never posed a significant threat.<\/p>\n<p id=\"arIndex_5\" data-ar-index=\"5\">The cyber activities therefore serve as a reminder of the need to set up robust ransomware detection and protection mechanisms. Systems should also be thoroughly inspected post-cleanup.<\/p>\n<p id=\"arIndex_6\" data-ar-index=\"6\">The sources for this piece include an article in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-use-ransomware-as-decoy-for-cyber-espionage\/\" target=\"_blank\" rel=\"noopener\">BleepingComputer<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat analysts from Secureworks have uncovered the activities of two Chinese hacking groups that use ransomware as a decoy for cyber espionage. Ransomware as a decoy allows attackers to cover their tracks, complicate attribution, and distract defenders. The two cluster of hacker activities are &#8220;Bronze Riverside&#8221; (APT41), and &#8220;Bronze Starlight&#8221; (APT10). Both use the HUI [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34,57,16],"tags":[388,393],"class_list":["post-24461","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence","category-companies","category-security","tag-privacy-security","tag-security-strategies"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/24461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=24461"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/24461\/revisions"}],"predecessor-version":[{"id":24463,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/24461\/revisions\/24463"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=24461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=24461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=24461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}