Advanced Persistent Threat Targets Vietnamese Human Rights Defenders with Sophisticated Malware Campaign

On August 28, 2024, cybersecurity firm Huntress released a detailed report uncovering a prolonged and sophisticated cyber espionage campaign targeting Vietnamese human rights defenders. The intrusion, believed to have been ongoing for at least four years

Advanced Persistent Threat Targets Vietnamese Human Rights Defenders with Sophisticated Malware Campaign
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (August 2024)

Introduction

On August 28, 2024, cybersecurity firm Huntress released a detailed report uncovering a prolonged and sophisticated cyber espionage campaign targeting Vietnamese human rights defenders. The intrusion, believed to have been ongoing for at least four years, exhibits significant overlap with the tactics, techniques, and procedures (TTPs) associated with the APT32/OceanLotus threat actor. This campaign highlights the persistent threat that nation-state actors pose to organizations and individuals involved in sensitive human rights advocacy.

Report Overview

The intrusion was discovered during routine threat-hunting operations conducted by Huntress analysts, who specialize in uncovering attacks that evade traditional security defences. The targeted organization, a non-profit supporting Vietnamese human rights, had been compromised for an extended period before Huntress' tools identified unusual activities on their network. The tactics observed align with those of APT32/OceanLotus, a known Vietnamese state-sponsored group with a history of targeting dissidents, journalists, and human rights organizations.

Huntress' investigation revealed that the attackers employed various sophisticated techniques to maintain persistence on the compromised systems. One of the primary methods included scheduled tasks masquerading as legitimate system processes. For example, a scheduled "Adobe Flash Updater" task executed a malicious script via Windows Script Host (wscript.exe), leveraging an alternate data stream to hide its payload. This method is reminiscent of known APT32 techniques, particularly their use of PowerShell and VBS scripts to deliver malware.

Another scheduled task used a malicious Java Archive (JAR) file specifically crafted for the target system. This adobe.jar file contained an embedded DLL that was loaded into memory to execute further malicious activities. The attackers also employed COM object hijacking to run malicious DLLs, further complicating detection efforts.

One of the most notable aspects of this campaign was using steganography to hide malicious code within seemingly benign PNG files. These images, such as logo.png, were used to load additional malware components into memory covertly. The attackers also leveraged legitimate binaries like IIS Express DLLs (iisutil.dll) that were modified to execute their payloads, demonstrating a high level of sophistication and a deep understanding of the Windows operating environment.

The potential consequences of this attack are significant, particularly for the targeted human rights defenders. The attackers' ability to maintain long-term access to these systems raises concerns about the extent of data exfiltration and the potential use of the compromised information for further espionage or repression activities. The broader implications include the erosion of trust in non-profit organizations and the chilling effect on human rights advocacy in regions where such activities are already dangerous.

Insights and Analysis

Huntress' findings highlight the importance of continuous monitoring and advanced threat-hunting techniques to detect and mitigate threats that evade standard security measures. This report suggests that the methods used in this campaign are consistent with those of APT32/OceanLotus, which has been active since at least 2013. The group's focus on human rights organizations aligns with their known targeting profile, further supporting the attribution to APT32.

Organizations, especially those involved in sensitive work like human rights advocacy, must adopt robust security practices to protect themselves from advanced persistent threats. Recommendations include:

  1. Implement advanced endpoint detection and response (EDR) solutions capable of detecting and responding to sophisticated threats.
  2. Review scheduled tasks, COM objects, and other potential persistence mechanisms for signs of tampering.
  3. Conduct frequent security audits and threat-hunting exercises to uncover hidden threats.
  4. Educate staff on the dangers of phishing and other common attack vectors nation-state actors use.

Insight into these incidents is critical in intelligence sharing when combating advanced persistent threats and preventing their objectives. The targeted campaign against Vietnamese human rights defenders highlights the ongoing risks faced by organizations and individuals involved in advocacy work. It is crucial for such entities to remain vigilant, continuously improve their security posture, and leverage advanced threat detection capabilities to defend against these sophisticated attacks.

Indicators of Compromise (IOCs)

IndicatorTypeDescription
msadobe.jarSHA256 HashMalicious JAR archive with an embedded DLL used in the attack.
1lpiozkc.nodeSHA256 HashMalicious Node addon file used to evade detection on the compromised system.
ms-adobe.binSHA256 HashPotentially encrypted shellcode or configuration file used in the attack.
goopdate.dllSHA256 HashMalicious DLL likely used to load additional payloads.
adobe.jarSHA256 HashMalicious JAR archive with an embedded DLL used in the attack.
cloud.batSHA256 HashBatch script used to download and run malicious files from a remote server.
iisutil2.dllSHA256 HashMalicious DLL with modifications used for obfuscation and payload execution.
logo.pngSHA256 HashImage file used for steganography to hide malicious code.
51.81.29[.]44IP AddressSuspected Cobalt Strike Team Server.
5.230.35[.]192IP AddressSuspected Cobalt Strike Team Server.

MITRE ATT&CK Tactics and Techniques

TacticTechniqueIDDescription
DiscoverySystem Owner/User DiscoveryT1033The attackers used the whoami /priv command to discover the system owner and user privileges.
ExecutionCommand and Scripting Interpreter: Windows Command ShellT1059.003Use of cmd.exe for executing scripts and commands.
PersistenceScheduled Task/Job: Scheduled TaskT1053.005Creation of scheduled tasks to maintain persistence on the compromised systems.
Defense EvasionObfuscated Files or Information: SteganographyT1027.003Use of image files (e.g., logo.png) to hide malicious code via steganography.
ExecutionEvent Triggered Execution: Component Object Model HijackingT1546.015Use of COM object hijacking to execute malicious DLLs.

References

Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders | Huntress
Huntress identified an intrusion against a non-profit supporting Vietnamese human rights that’s likely spanned years. Jump in as we provide a thorough analysis of this malicious threat actor.