TIDRONE Targets Military and Satellite Industries in Taiwan
A threat cluster we named TIDRONE, possibly linked to Chinese-speaking groups, has been actively targeting Taiwan's military-related industries, particularly drone manufacturers.
Introduction
A threat cluster we named TIDRONE, possibly linked to Chinese-speaking groups, has been actively targeting Taiwan's military-related industries, particularly drone manufacturers. The group uses advanced malware, including CXCLNT and CLNTEND, to conduct espionage activities. These malware variants, deployed through ERP software and remote desktop services, can steal sensitive data and conduct post-exploitation attacks.
Since early 2024, our team has investigated multiple incident reports from Taiwan, revealing a sophisticated, unidentified threat cluster called TIDRONE. These attackers have focused primarily on military-related industries, including drone manufacturers, using a range of advanced malware toolsets. Based on telemetry data from VirusTotal, this group's interests extend beyond Taiwan, highlighting a broader concern for industries globally.
Report Overview
TIDRONE has been observed leveraging enterprise resource planning (ERP) systems or remote desktop solutions to deploy their malware. The malware includes CXCLNT, which is capable of uploading/downloading files and clearing traces, and CLNTEND, a remote access tool (RAT) with wide-ranging communication protocols. Both toolsets have evolved, with attackers frequently updating their capabilities and refining anti-analysis techniques to avoid detection.
The main tools observed in this campaign, CXCLNT and CLNTEND, were delivered via a supply chain attack involving legitimate software such as UltraVNC, a tool for remote desktop access. The initial infection likely occurred some time ago, followed by lateral movement within targeted systems. The attackers utilized legitimate executables to side-load malware into compromised environments.
CXCLNT is information-stealing malware that gathers details such as file listings, system names, and network architecture. CLNTEND, on the other hand, is a more sophisticated RAT that supports a variety of network protocols (TCP, HTTP, HTTPS, TLS, and SMB) for remote control. The attack chain frequently involved bypassing User Account Control (UAC), credential dumping, and the use of hacking tools to turn off antivirus software.
In the post-exploitation phase, TIDRONE attackers employed UAC bypass techniques and credential-dumping tools to escalate privileges. Command-line execution of processes such as winsrv.exe was observed, which allowed the malware to copy security tokens and further entrench itself within the system.
Insights and Analysis
TIDRONE's campaign demonstrates the evolution of advanced persistent threats (APTs) targeting critical industries, particularly in geopolitically sensitive regions. Their use of malware like CXCLNT and CLNTEND shows an advanced understanding of security mechanisms, allowing them to avoid detection while maintaining persistence in compromised systems.
In their investigation, TIDRONE has shown itself as a competent threat actor focusing on espionage, particularly within Taiwan's military-related industries. The group uses sophisticated malware to steal sensitive information and maintain long-term access to compromised systems. To mitigate the risks posed by TIDRONE, organizations should:
- Download software only from trusted sources.
- Be cautious of social engineering tactics that could serve as attack entry points.
- Employ advanced anti-malware tools to detect and stop early signs of compromise.
Indicators of Compromise (IOCs)
Indicator | Type | Description |
---|---|---|
f13869390dda83d40960d4f8a6b438c5c4cd31b4d25def7726c2809ddc573dc7 | File | Trojan.Win32.CXCLNT.ZTLH |
e366f0209a939503418f2b7befbd60b79609b7298fed9c2fbafcb0e7fde19740 | File | Trojan.Win32.CXCLNT.ZTLH |
bestadll[.]fghytr[.]com | Network | Potential Command and Control (C2) domain |
client[.]wns[.]windowswns[.]com | Network | Potential Command and Control (C2) domain |
MITRE ATT&CK Techniques
Tactic | Technique | ID | Description |
---|---|---|---|
Initial Access | Valid Accounts | T1078 | Attackers use compromised credentials for access |
Execution | Command and Scripting Interpreter | T1059 | Likely used for executing malicious commands in post-exploitation |
Privilege Escalation | User Account Control (UAC) Bypass | T1548.002 | Techniques used to bypass User Account Control (UAC) protections |
Credential Access | OS Credential Dumping | T1003 | Credential dumping techniques for gathering sensitive information |
Defense Evasion | Disable or Modify Tools | T1562.001 | Hack tools used to disable antivirus or security products |
Persistence | Create or Modify System Process | T1543 | Persistence through system modifications, including service creation |
Comments ()