#EvasivePanda

2024-11-02

💡 Evasive Panda is making waves with its modular espionage tool, CloudScout, which bypasses MFA using stolen session cookies. Are you monitoring your organization's cloud activity effectively? 🧐

💡 Quick Tip: Implement behavior analysis and zero-trust policies to catch suspicious activities.

What additional steps do you take to stay ahead of APTs? Comment below!

Discover more about CloudScout here: guardiansofcyber.com/cybersecu

#Cybersecurity #GuardiansOfCyber #APT #DataProtection #CloudSecurity #ThreatIntelligence #EvasivePanda

2024-03-07

#ESETresearch has discovered a new campaign by China-aligned #APT #EvasivePanda, leveraging the Monlam Festival to target Tibetans. The campaign included a targeted watering hole, compromised news website, and an additional supply-chain attack to deliver malware for Windows and macOS, including a backdoor we have named #Nightdoor. welivesecurity.com/en/eset-res
Attackers compromised the Kagyu International Monlam Trust website to use as a watering hole. Malicious, obfuscated JavaScript was appended to a script executed when potential victims visit the site, testing whether the visitor’s IP address is in one of several IP ranges.
These ranges indicate a targeted attack looking to compromise networks in 🇮🇳, 🇹🇼, 🇦🇺, 🇺🇸 and 🇭🇰. The chart shows the distribution of targeted IP ranges. Interestingly, one of the targeted networks we identify is a high-profile university in the US.
In the supply-chain, compromise attackers planted trojanized installer packages of Tibetan language translation software developed by a company based in India. The installers for Windows and macOS deployed both a malicious dropper and the legitimate software application.
We found several downloaders whose C&C servers provide a JSON object pointing to the next stage – another downloader or an installer for backdoors including EvasivePanda’s traditional #MgBot and Nightdoor. The latter is a full-featured backdoor using Google Drive for its C&C.
ESET researchers Facundo Munoz (@0xfmz) and Anh Ho will be presenting their latest research on Evasive Panda activities and capabilities at the upcoming #Botconf2024. botconf.eu/provisional-schedul
IoCs are available in ESET GitHub repository

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst