ToddyCat has Malicious Tools

12264371884?profile=RESIZE_400xThe advanced persistent threat (APT) actor known as ToddyCat has been linked to a new set of malicious tools that are designed for data exfiltration, offering a deeper insight into the hacking crew's tactics and capabilities.  ToddyCat is a Chinese APT actor who has launched a campaign against telecom and government sectors in Asian countries.  The campaign has been named “Stayin’ Alive.”  The Stayin' Alive campaign consists of mostly downloaders and loaders, some of which are used as an initial infection vector against high-profile Asian organizations.  The first downloader found called CurKeep, targeted Vietnam, Uzbekistan, and Kazakhstan. As investigators conducted their analysis, they realized that this campaign is part of a much wider campaign targeting the region.[1]

Readers who remember the disco era of 1970’s music “Stayin’ Alive” was a song performed by the group called the Bee Gees.  The song was featured in the movie Saturday Night Fever.

While the group's attacks prominently feature Ninja Trojan and a backdoor called Samurai, further investigation has uncovered a whole new set of malicious software developed and maintained by the actor to achieve persistence, conduct file operations, and load additional payloads at runtime.

See:  https://redskyalliance.org/xindustry/trouble-down-on-the-farm

This comprises a collection of loaders that comes with capabilities to launch the Ninja Trojan as a second stage, a tool called LoFiSe to find and collect files of interest, a DropBox uploader to save stolen data to Dropbox, and Pcexter to exfiltrate archive files to Microsoft OneDrive.

ToddyCat has also been observed utilizing custom scripts for data collection, a passive backdoor that receives commands with UDP packets, Cobalt Strike for post-exploitation, and compromised domain admin credentials to facilitate lateral movement to pursue its espionage activities.

Researchers observed script variants designed solely to collect data and copy files to specific folders, but without including them in compressed archives.   In these cases, the actor executed the script on the remote host using the standard remote task execution technique.  The collected files were then manually transferred to the exfiltration host using the xcopy utility and finally compressed using the 7z binary.

This article is presented at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization and has reported extensively on AI technology.  For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or feedback@redskyalliance.com    

Weekly Cyber Intelligence Briefings:

Weekly Cyber Intelligence Briefings:

REDSHORTS - Weekly Cyber Intelligence Briefings

https://attendee.gotowebinar.com/register/5993554863383553632

[1] https://thehackernews.com/2023/10/researchers-unveil-toddycats-new-set-of.html

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!