Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall 0-Days
British cybersecurity firm Sophos has faced ongoing attacks from Chinese government-backed hackers since 2018, targeting vulnerabilities in its products and shifting focus towards government and critical infrastructure in the Asia-Pacific region.
Read original articleBritish cybersecurity firm Sophos has revealed its ongoing battle with sophisticated Chinese government-backed hackers, detailing a series of attacks that began in 2018. The attackers targeted vulnerabilities in Sophos' enterprise products, particularly focusing on zero-day exploits. Notably, a breach at Sophos' Cyberoam office in India allowed hackers to gain initial access through a neglected display unit. Sophos reported that the attackers employed various advanced techniques, including a custom userland rootkit and a unique UEFI bootkit, to maintain persistence and control over compromised devices. In response, Sophos deployed its own custom implants to monitor the attackers' activities, which led to the discovery of a stealthy remote code execution exploit. The hackers utilized SQL injection and command injection methods to install malware on firewalls, particularly during the pandemic when remote work surged. Sophos also noted a strategic shift in the attackers' focus towards government and critical infrastructure organizations in the Asia-Pacific region. The company collaborated with the Netherlands’ National Cyber Security Centre to disrupt the attackers' command and control infrastructure. This ongoing conflict highlights the evolving nature of cyber threats and the necessity for robust cybersecurity measures.
- Sophos has been engaged in a prolonged conflict with Chinese government-backed hackers since 2018.
- The attackers exploited zero-day vulnerabilities in Sophos' products, using advanced techniques for persistence.
- Sophos deployed custom implants to monitor the attackers and discovered new exploits.
- The focus of the attacks shifted towards government and critical infrastructure targets in the Asia-Pacific.
- Collaboration with national cybersecurity agencies was key in countering the attackers' operations.
Related
China-linked cyber-spies infect Russian govt, IT sector
Chinese cyber-spies compromised Russian government and IT systems using malware, including GrewApacha and CloudSorcerer, through phishing emails and cloud services, indicating collaboration among state-sponsored hacking groups.
New 0-Day Attacks Linked to China's 'Volt Typhoon'
Malicious hackers linked to China's Volt Typhoon group are exploiting a zero-day vulnerability in Versa Director, urging customers to update systems to prevent potential disruptions to critical U.S. infrastructure.
Russian government hackers used spyware exploits made by NSO and Intellexa
Russian hackers are exploiting vulnerabilities similar to those from NSO Group, targeting Mongolian government websites and affecting iPhone and Android users. Google urges software updates to mitigate risks.
Powerful Spyware Exploits Enable a New String of 'Watering Hole' Attacks
Suspected Russian hackers linked to APT29 Cozy Bear executed "watering hole" attacks on Mongolian government websites, targeting unpatched devices with exploits similar to commercial spyware, highlighting ongoing cybersecurity risks.
Chinese hackers access US telecom firms, worrying national security officials
Chinese government-linked hackers infiltrated U.S. telecom firms, accessing sensitive information. The Chinese Embassy denies allegations, while U.S. officials and cybersecurity experts investigate the skilled hacking group, Salt Typhoon.
Related
China-linked cyber-spies infect Russian govt, IT sector
Chinese cyber-spies compromised Russian government and IT systems using malware, including GrewApacha and CloudSorcerer, through phishing emails and cloud services, indicating collaboration among state-sponsored hacking groups.
New 0-Day Attacks Linked to China's 'Volt Typhoon'
Malicious hackers linked to China's Volt Typhoon group are exploiting a zero-day vulnerability in Versa Director, urging customers to update systems to prevent potential disruptions to critical U.S. infrastructure.
Russian government hackers used spyware exploits made by NSO and Intellexa
Russian hackers are exploiting vulnerabilities similar to those from NSO Group, targeting Mongolian government websites and affecting iPhone and Android users. Google urges software updates to mitigate risks.
Powerful Spyware Exploits Enable a New String of 'Watering Hole' Attacks
Suspected Russian hackers linked to APT29 Cozy Bear executed "watering hole" attacks on Mongolian government websites, targeting unpatched devices with exploits similar to commercial spyware, highlighting ongoing cybersecurity risks.
Chinese hackers access US telecom firms, worrying national security officials
Chinese government-linked hackers infiltrated U.S. telecom firms, accessing sensitive information. The Chinese Embassy denies allegations, while U.S. officials and cybersecurity experts investigate the skilled hacking group, Salt Typhoon.