Phishing, Threat Intelligence

Cobalt Strike deployment sought by covert China-targeted campaign

Share
Plain code with the word "cyberattack" in red.

Organizations across China are having their Windows systems targeted with Cobalt Strike payloads as part of the new stealthy SLOW#TEMPEST attack campaign, according to The Hacker News.

Threat actors distributed phishing emails with malicious ZIP files containing a Word-spoofing LNK file purporting to be a list of individuals who committed remote control software regulation violations, which facilitates the deployment of a Microsoft binary and a DLL file concealing Cobalt Strike, a report from Securonix showed. Aside from enabling covert and persistent host access that allowed further payload deployment, Cobalt Strike execution also permitted privilege escalation, lateral movement via Remote Desktop Protocol, and credential exfiltration via the Mimikatz tool, said the report. "Although there was no solid evidence linking this attack to any known APT groups, it is likely orchestrated by a seasoned threat actor who had experience using advanced exploitation frameworks such as Cobalt Strike and a wide range of other post-exploitation tools," said researchers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.