APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经给出了文章的英文内容,所以我需要先理解这篇文章的主要信息。 首先,文章讲的是一个叫做Silver Dragon的高级持续性威胁(APT)组织。这个组织自2024年中期以来,针对欧洲和东南亚的实体进行了网络攻击。Check Point的研究报告中提到,Silver Dragon通过利用公共互联网服务器和带有恶意附件的钓鱼邮件进行初始入侵。为了维持持久性,他们劫持了合法的Windows服务,使恶意进程看起来像是正常的系统活动。 接下来,文章指出Silver Dragon与APT41有关联。APT41是一个活跃的中国黑客组织,自2012年起就针对医疗、电信、高科技、教育、旅游服务和媒体行业进行网络间谍活动,并可能参与财务动机的活动。Silver Dragon主要攻击政府机构,并使用Cobalt Strike信标来维持对受损主机的控制。他们还使用DNS隧道技术进行命令与控制通信以绕过检测。 Check Point识别了三种不同的感染链来分发Cobalt Strike:AppDomain劫持、服务DLL和基于电子邮件的钓鱼攻击。前两种感染链显示了操作上的重叠,都通过压缩存档交付,并在公开暴露的易受攻击服务器被攻陷后使用。第三种感染链涉及针对乌兹别克斯坦的钓鱼活动,使用恶意Windows快捷方式作为附件。 此外,文章提到Silver Dragon部署了多种后利用工具,如用于监控屏幕捕获用户活动的SilverScreen工具、用于远程命令执行和文件传输的SSHcmd工具以及GearDoor后门程序。GearDoor通过Google Drive与C2基础设施通信,并根据文件扩展名执行不同的任务。 最后,文章指出Silver Dragon与APT41之间的联系源于两者在后利用安装脚本上的技术重叠以及BamboLoader使用的解密机制与中国关联的APT活动有关。 总结一下,这篇文章主要介绍了Silver Dragon APT组织如何通过多种方法进行网络攻击,并详细描述了他们的技术手段和工具。 </think> 这篇文章描述了一个名为“银龙”(Silver Dragon)的高级持续性威胁(APT)组织自2024年中期以来针对欧洲和东南亚实体实施网络攻击的情况。该组织通过利用公共互联网服务器和钓鱼邮件进行初始入侵,并劫持合法Windows服务以维持持久性。其主要目标是政府机构,并使用Cobalt Strike信标和DNS隧道技术进行通信。Check Point识别出三种感染链:AppDomain劫持、服务DLL和钓鱼邮件,并详细介绍了每种链的工作机制以及使用的恶意软件如BamboLoader等。此外,“银龙”还部署了多种后利用工具如SilverScreen、SSHcmd和GearDoor等来进一步控制受损系统。“银龙”被认为与活跃于中国的APT41有关联,后者以网络间谍活动著称,并可能参与财务动机驱动的攻击。“银龙”展示了高度资源化和适应性强的特点,在不同活动中不断测试并部署新能力。 总结:该文章揭示了一个名为“银龙”的新型APT组织如何通过复杂的技术手段对政府机构实施网络攻击,并强调其与中国背景的APT41之间的联系及其高度进化的威胁能力。 注:由于字数限制,请允许我对内容进行适当删减以符合要求: “银龙”(Silver Dragon)是一个新型APT组织自2024年中期以来针对欧洲及东南亚政府机构实施网络攻击。“银龙”通过钓鱼邮件及利用公共服务器漏洞进行初始入侵,并劫持合法Windows服务维持存在。其主要工具包括Cobalt Strike信标及DNS隧道技术用于隐蔽通信。“银龙”被认为与中国背景的APT41有关联,后者以网络间谍活动著称。“银龙”展示了高度资源化且适应性强的特点,在不同活动中不断测试并部署新能力。” (共计99字) 最终版本: “银龙”(Silver Dragon)是一个新型APT组织自2024年中期以来针对欧洲及东南亚政府机构实施网络攻击。“银龙”通过钓鱼邮件及利用公共服务器漏洞进行初始入侵,并劫持合法Windows服务维持存在。其主要工具包括Cobalt Strike信标及DNS隧道技术用于隐蔽通信。“银龙”被认为与中国背景的APT41有关联。” (共计83字) 或者更简洁: “银龙”(Silver Dragon)是一个新型APT组织自2024年中期以来针对欧洲及东南亚政府机构实施网络攻击。“银龙”通过钓鱼邮件及利用公共服务器漏洞进行初始入侵,并劫持合法Windows服务维持存在。” (共计56字) 根据您的具体要求选择合适的版本即可。 2026-3-4 08:14:0 Author: thehackernews.com(查看原文) 阅读量:5 收藏

Malware / Windows Security

Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024.

"Silver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments," Check Point said in a technical report. "To maintain persistence, the group hijacks legitimate Windows services, which allows the malware processes to blend into normal system activity."

Silver Dragon is assessed to be operating within the APT41 umbrella. APT41 is the cryptonym assigned to a prolific Chinese hacking group known for its targeting of healthcare, telecoms, high-tech, education, travel services, and media sectors for cyber espionage as early as 2012. It's also believed to engage in financially motivated activity potentially outside of state control.

Attacks mounted by Silver Dragon have been found to primarily single out government entities, with the adversary using Cobalt Strike beacons for persistence on compromised hosts. It's also known to employ techniques like DNS tunneling for command-and-control (C2) communication to bypass detection.

Check Point said it identified three different infection chains to deliver Cobalt Strike: AppDomain hijacking, service DLL, and email-based phishing.

"The first two infection chains, AppDomain hijacking and Service DLL, show clear operational overlap," the cybersecurity company said. "They are both delivered via compressed archives, suggesting their use in post‑exploitation scenarios. In several cases, these chains were deployed following the compromise of publicly exposed vulnerable servers."

The two chains make use of a RAR archive containing a batch script, with the first chain using it to drop MonikerLoader, a NET-based loader responsible for decrypting and executing a second-stage directly in memory. The second stage, for its part, mimics MonikerLoader's behavior, acting as a conduit for loading the final Cobalt Strike beacon payload.

On the other hand, the service DLL chain uses a batch script to deliver a shellcode DLL loader dubbed BamboLoader, which is registered as a Windows service. A heavily obfuscated C++ malware, it's used to decrypt and decompress shellcode staged on disk, and inject it into a legitimate Windows process, such as "taskhost.exe." The binary targeted for injection is configurable within BamboLoader.

The third infection chain involves a phishing campaign that has primarily targeted Uzbekistan with malicious Windows shortcuts (LNK) as attachments. The weaponized LNK file is designed to launch PowerShell code by means of "cmd.exe," leading to the extraction and execution of next-stage payloads. This includes four different files -

  • Decoy document
  • Legitimate executable vulnerable to DLL side-loading ("GameHook.exe")
  • Malicious DLL aka BamboLoader ("graphics-hook-filter64.dll")
  • Encrypted Cobalt Strike payload ("simhei.dat")

As part of this campaign, the decoy document is displayed to the victim, while, in the background, the rogue DLL is sideloaded via "GameHook.exe" to ultimately launch Cobalt Strike. The attacks are also characterized by the deployment of various post-exploitation tools -

  • SilverScreen, a .NET screen-monitoring tool used to capture periodic screenshots of user activity, including precise cursor positioning.
  • SSHcmd, a .NET command-line SSH utility that provides remote command execution and file transfer capabilities over SSH.
  • GearDoor, a NET backdoor that shares similarities with MonikerLoader and communicates with its C2 infrastructure via Google Drive.

Once executed, the backdoor authenticates to the attacker-controlled Google Drive account and uploads a heartbeat file containing basic system information. Interestingly, the backdoor utilizes different file extensions to indicate the nature of the task to be performed on the infected host. The results of the task execution are captured and uploaded to Drive.

  • *.png, to send heartbeat files.
  • *.pdf, to receive and execute commands, list the contents of a directory, make a new directory, and remove all files within a specified directory. The results of the operation are sent to the server in the form of a *.db file.
  • *.cab, to receive and execute commands to gather host information and a list of running processes, enumerate files and directories, run commands via "cmd.exe" or scheduled tasks, upload files to Google Drive, and terminate the implant. The execution status is uploaded as a .bak file.
  • *.rar, to receive and execute payloads. If the RAR file is named "wiatrace.bak," the backdoor treats it as a self-update package. The results are uploaded as .bak files.
  • *.7z, to receive and execute plugins in memory. The results are uploaded as .bak files.

Silver Dragon's links to APT41 stem from tradecraft overlaps with post-exploitation installation scripts previously attributed to the latter and the fact that the decryption mechanism used by BamboLoader has been observed in shellcode loaders linked to China-nexus APT activity.

"The group continuously evolves its tooling and techniques, actively testing and deploying new capabilities across different campaigns," Check Point said. "The use of diverse vulnerability exploits, custom loaders, and sophisticated file-based C2 communication reflects a well-resourced and adaptable threat group."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/apt41-linked-silver-dragon-targets.html
如有侵权请联系:admin#unsafe.sh