{"id":674,"date":"2022-01-20T15:00:00","date_gmt":"2022-01-20T22:00:00","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/?p=674"},"modified":"2022-01-19T18:09:38","modified_gmt":"2022-01-20T01:09:38","slug":"global-high-value-government-organizations-and-private-institutions-targeted-by-chinese-hackers-earth-lusca","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/01\/20\/global-high-value-government-organizations-and-private-institutions-targeted-by-chinese-hackers-earth-lusca\/","title":{"rendered":"Global high-value government organizations and private institutions targeted by Chinese hackers &#8220;Earth Lusca&#8221;"},"content":{"rendered":"\n<p class=\"has-normal-font-size\"><strong>Who is &#8220;Earth Lusca&#8221; and what is their motivation?<\/strong><\/p>\n\n\n\n<p>Earth Lusca is a Chinese-based cyber-espionage group that has been very active in recent years. Their main motivation is spying and gaining intelligence information from government and private institutions worldwide. It has been rumored that they spy on other governments and institutions for the benefit of the Chinese government but these rumors remain uncertain as they have also been associated with purely financially-motivated attacks against Chinese companies.&nbsp;<\/p>\n\n\n\n<p>When looking at some of the attacks that were withheld, the rumors of working with the Chinese government make sense. A list of the institutions and organizations they organized these attacks against include\u00b9:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Government institutions in Taiwan, Thailand, Philippines, Vietnam, United Arab Emirates, Mongolia, and Nigeria<\/li><li>Educational institutions in Taiwan, Hong Kong, Japan, and France<\/li><li>News media in Taiwan, Hong Kong, Australia, Germany, and France<\/li><li>Pro-democracy and human rights political organizations and movements in Hong Kong<\/li><li>Covid-19 research organizations in the United States<\/li><li>Telecom companies in Nepal<\/li><li>Religious movements that are banned in Mainland China<\/li><\/ul>\n\n\n\n<p>I think it&#8217;s rather worrying that this group continues to undertake these attacks world-wide with no apparent consequences. This has been going on for the past few years! <\/p>\n\n\n\n<p>I also think it&#8217;s quite interesting to note that in the recent past it has almost become a trend for government espionage groups to take part in financially-motivated attacks. Some examples include\u00b2 Rocket Kitten (Iran), Lazarus Group (North Korea), and UGNazi.&nbsp;<\/p>\n\n\n\n<p class=\"has-normal-font-size\"><strong>How are the attacks being operated?<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"800\" height=\"530\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/01\/new-chinese-threat-group-conducts-espionage-theft-showcase_image-2-a-18336.jpg\" alt=\"\" class=\"wp-image-680 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/01\/new-chinese-threat-group-conducts-espionage-theft-showcase_image-2-a-18336.jpg 800w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/01\/new-chinese-threat-group-conducts-espionage-theft-showcase_image-2-a-18336-300x199.jpg 300w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/01\/new-chinese-threat-group-conducts-espionage-theft-showcase_image-2-a-18336-768x509.jpg 768w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/530;\" \/><figcaption>(3)<\/figcaption><\/figure>\n\n\n\n<p>As it can be seen in the above diagram, there are two pathways that the group operates on. The bottom pathway relies on virtual private servers (VPS) that push out watering hole and spear phishing operations to victims\u2019 computers. Once victims\u2019 computers are compromised by malware, this pathway is also used as a command-and-control server (C&amp;C callback) to gain complete control of victims\u2019 computers.&nbsp;<\/p>\n\n\n\n<p>The top pathway in the diagram also acts as a C&amp;C server. It also serves another function of searching a victims\u2019 computer for loopholes, vulnerabilities and building tunnels within the victims\u2019 network (EarthWorm tunneling).&nbsp;<\/p>\n\n\n\n<p>To emphasize on the technicalities, some of the malwares Earth Lusca use include\u2074:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Doraemon backdoor<\/li><li>FunnySwitch backdoor<\/li><li>ShadowPad backdoor<\/li><li>Winnti malware<\/li><li>AntSword web shell<\/li><li>Behinder web shell<\/li><\/ul>\n\n\n\n<p class=\"has-normal-font-size\"><strong>How can the attacks be minimized or even stopped?<\/strong><\/p>\n\n\n\n<p>Funny enough, researchers suggest that by simply avoiding clicking on links in emails\/websites from unknown sources and updating applications regularly, this can significantly minimize these attacks or even completely stop them. I think it&#8217;s crazy (and funny) to think that governments and high-value organizations, who constantly advise the public about the importance of cyber security, are getting attacked and hacked this easily. Advanced cyber security tools such as &#8220;Trend Micro XDR&#8221; can also be used by big organizations to provide maximum protection against such groups. According to Trend Micro&#8217;s technical analysis on Earth Lusca, these tools work by &#8220;collecting and correlating activity data across multiple vectors \u2014 from emails and endpoints to servers, cloud workloads, and networks \u2014 enabling a layer of security detection and investigation that cannot be matched by traditional security solutions.&#8221;\u2075<\/p>\n\n\n\n<p>On a final note, I would like to share my opinion on organizations and how they handle\/talk about cyber security. I think that most companies and governments in the recent years have raised awareness to the general public about the importance of cyber security and have started applying advanced and modern tools of cyber protection. However, I think the topic is still not taken seriously by many and some companies are also not very transparent about the whole process. Cybersecurity failure is one of the main risks that face the entire world in the short-term and medium-term and should be treated according to its magnitude. (The Global Risks Report)<\/p>\n\n\n\n<p>References:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><a href=\"https:\/\/therecord.media\/earth-lusca-threat-actor-targets-governments-and-cryptocurrency-companies-alike\/\">https:\/\/therecord.media\/earth-lusca-threat-actor-targets-governments-and-cryptocurrency-companies-alike\/<\/a> (list of institutions)<\/li><li><a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_hacker_groups\">https:\/\/en.wikipedia.org\/wiki\/List_of_hacker_groups<\/a> (hacker groups)<\/li><li>https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/earth-lusca-employs-sophisticated-infrastructure-varied-tools-and-techniques\/technical-brief-delving-deep-an-analysis-of-earth-lusca-operations.pdf (pathways image, Trend Micro&#8217;s Analysis of Earth Lusca&#8217;s Operations, Page 2 Figure 2)<\/li><li><a href=\"https:\/\/www.bankinfosecurity.com\/new-chinese-threat-group-conducts-espionage-theft-a-18336\">https:\/\/www.bankinfosecurity.com\/new-chinese-threat-group-conducts-espionage-theft-a-18336<\/a> (list of malwares)<\/li><li><a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/earth-lusca-employs-sophisticated-infrastructure-varied-tools-and-techniques\/technical-brief-delving-deep-an-analysis-of-earth-lusca-operations.pdf\">https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/a\/earth-lusca-employs-sophisticated-infrastructure-varied-tools-and-techniques\/technical-brief-delving-deep-an-analysis-of-earth-lusca-operations.pdf<\/a> (page 28: conclusion)<\/li><li><a href=\"https:\/\/www.trendmicro.com\/en_id\/research\/22\/a\/earth-lusca-sophisticated-infrastructure-varied-tools-and-techni.html\">https:\/\/www.trendmicro.com\/en_id\/research\/22\/a\/earth-lusca-sophisticated-infrastructure-varied-tools-and-techni.html<\/a><\/li><li><a href=\"https:\/\/www3.weforum.org\/docs\/WEF_The_Global_Risks_Report_2021.pdf\">https:\/\/www3.weforum.org\/docs\/WEF_The_Global_Risks_Report_2021.pdf<\/a> (the global risks report)<\/li><\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Who is &#8220;Earth Lusca&#8221; and what is their motivation? Earth Lusca is a Chinese-based cyber-espionage group that has been very active in recent years. Their main motivation is spying and gaining intelligence information from government and private institutions worldwide. It has been rumored that they spy on other governments and institutions for the benefit of &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/01\/20\/global-high-value-government-organizations-and-private-institutions-targeted-by-chinese-hackers-earth-lusca\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Global high-value government organizations and private institutions targeted by Chinese hackers &#8220;Earth Lusca&#8221;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":296,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-674","post","type-post","status-publish","format-standard","hentry","category-cpsc-329-602-w22","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Omar Ghander","author_link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/author\/omar-ghander\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/users\/296"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/comments?post=674"}],"version-history":[{"count":4,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/674\/revisions"}],"predecessor-version":[{"id":917,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/674\/revisions\/917"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/media?parent=674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/categories?post=674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/tags?post=674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}