TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
TheWizards, a China-aligned APT group, employs Spellbinder, a lateral movement tool for adversary-in-the-middle attacks through IPv6 SLAAC spoofing. This technique allows them to intercept network traffic and redirect legitimate Chinese software updates to malicious servers. The group targets individuals, gambling companies, and entities in Southeast Asia, UAE, China, and Hong Kong. Their malware chain includes the WizardNet backdoor and utilizes DNS hijacking to deliver malicious updates. Evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting it may be a digital quartermaster for this APT group. The attackers use sophisticated tools and techniques to evade detection and maintain persistence on compromised systems.
Pulse ID: 68124373bde0da2a4679b021
Pulse Link: https://otx.alienvault.com/pulse/68124373bde0da2a4679b021
Pulse Author: AlienVault
Created: 2025-04-30 15:36:19
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AdversaryInTheMiddle #Asia #BackDoor #China #Chinese #CyberSecurity #DNS #HongKong #InfoSec #Malware #OTX #OpenThreatExchange #RCE #UAE #bot #AlienVault