China-Linked Cyber Spies Infiltrate Russian Systems: Malware Mayhem Unleashed

Cyber-spies suspected of Chinese connections have infected Russian government computers with backdoors and trojans, according to Kaspersky. Dubbed EastWind, the attacks involve malware linked to APT27 and APT31. Using phishing emails, the spies deployed trojans like GrewApacha and CloudSorcerer, leveraging cloud services as command-and-control servers.

Hot Take:

Who knew that Russia’s cyber snoops would be the ones getting snooped on? It’s like a spy movie where James Bond gets hacked by Q, except Q is a Chinese APT group and Bond is… well, let’s just say he needs to update his antivirus software.

Key Points:

  • Chinese APT groups APT27 and APT31 are suspected to be behind the EastWind attacks targeting Russian government agencies and IT providers.
  • Attackers used phishing emails with RAR attachments to infect devices with backdoors and trojans.
  • Cloud services like GitHub, Dropbox, Quora, and LiveJournal were utilized as command-and-control servers.
  • Key malware involved includes GrewApacha and CloudSorcerer, with the latter being updated to use new C2 methods.
  • New implant dubbed PlugY discovered, capable of extensive spying activities.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here