menu
techminis

A naukri.com initiative

google-web-stories
source image

Socprime

2w

read

389

img
dot

Image Credit: Socprime

Operation AkaiRyū Attacks Detection: China-Backed MirrorFace APT Targets Central European Diplomatic Institute Using ANEL Backdoor

  • China-linked threat groups are prominent in global APT campaigns, with MirrorFace expanding targeting to a European diplomatic agency using the ANEL backdoor in the AkaiRyū operation.
  • Amid rising geopolitical tensions, APTs pose significant cybersecurity threats, with state-sponsored actors employing zero-day vulnerabilities and advanced malware to infiltrate critical systems.
  • SOC Prime Platform offers detection algorithms to counter MirrorFace APT attacks, aligned with MITRE ATT&CK framework for seamless integration into security tools.
  • Security professionals can leverage Uncoder AI to parse and utilize IOCs from ESET's Operation AkaiRyū research for tailored SIEM or EDR queries.
  • By exploring the Threat Detection Marketplace, defenders can access rules and queries to detect malicious activities associated with state-sponsored APT groups.
  • MirrorFace's AkaiRyū operation targeted a Central European diplomatic entity in 2024, utilizing tools like AsyncRAT, ANEL backdoor, Visual Studio Code's remote tunnels, and more.
  • MirrorFace, a China-linked threat actor, has targeted various sectors since 2019 and exhibited advanced TTPs, including spearphishing campaigns and the use of LODEINFO and HiddenFace backdoors.
  • MirrorFace's operations in 2024 involved spearphishing and the deployment of malicious files through trusted applications, like McAfee and JustSystems, to install the ANEL backdoor.
  • By erasing evidence and employing techniques like running malware in Windows Sandbox, MirrorFace has enhanced operational security, emphasizing the need for heightened cybersecurity vigilance globally.
  • The surge in cyber-espionage campaigns by China-backed groups underscores the importance of proactive defense measures and global collaboration to mitigate evolving cyber threats.

Read Full Article

like

23 Likes

For uninterrupted reading, download the app