icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Chinese APT15 Hackers Resurface with New Graphican Malware

Cyber Security Threat Summary:
“Today, the Threat Hunter Team at Symantec, part of Broadcom, reports that APT15's latest campaign targets foreign affairs ministries in Central and South American countries. The researchers report that the new Graphican backdoor is an evolution of an older malware used by the hackers rather than a tool created from scratch. It is notable for using Microsoft Graph API and OneDrive to stealthily obtain its command and control (C2) infrastructure addresses in encrypted form, giving it versatility and resistance against take-downs. Graphican, the new backdoor utilized by the Chinese APT15 hacking group, carries out a series of operations on infected devices. These include disabling Internet Explorer 10's first-run wizard, verifying the status of the 'iexplore.exe' process, and constructing a global IWebBrowser2 COM object for internet access. Graphican also authenticates with Microsoft Graph API, enumerates files and folders in the "Person" OneDrive directory, decrypts the first folder's name for use as a command and control (C&C) server, and generates a unique Bot ID. The backdoor registers the bot with the C&C server and regularly checks for new commands to execute, enabling threat actors to carry out various actions such as launching programs and downloading files. APT15 utilizes various command and control (C&C) commands in their operations. These commands include creating an interactive command line ('C'), creating files on remote computers ('U'), downloading files from remote computers to the C&C server ('D'), creating new processes with hidden windows ('N'), and creating new PowerShell processes with hidden windows and saving results in temporary files ('P'). Additionally, Symantec's researchers have observed other tools employed by APT15 in their latest campaign” (BleepingComputer, 2023). Security Officer Comments:
The particular threat group uses phishing emails as an initial infection vector; however, they are also known for exploiting vulnerable internet-exposed endpoints and using VPNs as an initial access vector. Between late 2022 and early 2023, APT15 targeted foreign affairs ministries in Central and South American countries. APT15, active since at least 2004, has a history of targeting important public and private organizations worldwide. The Graphican backdoor, an evolution of their previous malware, utilizes Microsoft Graph API and OneDrive for stealthy command and control (C2) communication. Suggested Correction(s):
CISA has ordered federal agencies to restrict access to internet-exposed networking equipment in response to increasing attacks exploiting vulnerabilities, private companies should do the same. Mitigation measures against phishing attacks include security awareness training, email filtering, multi-factor authentication, strong passwords, phishing simulations, software updates, incident response, website encryption, monitoring, and promoting a security-conscious culture, enhancing resilience against phishing. Link(s):
https://www.bleepingcomputer.com/