China-Linked Threat Group Targets Japanese Orgs' Servers

Winnti, a China-affiliated threat actor, has been linked to a new cyber campaign called RevivalStone, which has been observed targeting Japanese companies within the manufacturing, materials, and energy sectors.
Winnti has been active since at least 2012, but only started targeting Asian manufacturing and materials organizations within the past few years.
The group's activity, according to researchers at LAC, notably overlaps with a group known as Earth Freybug, a subset of APT41, a well-known cyber espionage group.
In targeting organizations in the Asia-Pacific region, Winnti is exploiting vulnerabilities found in applications like IBM Lotus Domino to deploy malicious malware, including DEATHLOTUS, UNAPIMON, PRIVATELOG, CUNNINGPIGEON, WINDJAMMER, and SHADOWGAZE.
LAC researchers have also observed Winnti exploiting an SQL injection vulnerability in an enterprise resource planning system to drop Web shells on an infected server. Once gaining access, the threat actor collects credentials, performs reconnaissance, and delivers the Winnti malware.
This malware is an improved version, capable of expanding further to breach a managed service provider.
According to a statement by the LAC researchers, "The new Winnti malware has been implemented with features such as obfuscation, updated encryption algorithms, and evasion by security products, and it is likely that this attacker group will continue to update the functions of the Winnti malware and use it in attacks."
source: DarkReading
Free online web security scanner
Top News:

Content Credentials Technology Verifies Image, Video Authenticity
February 13, 2025
New NailaoLocker ransomware used against EU healthcare orgs
February 20, 2025
Windows Server 2025 released—here are the new features
November 5, 2024
Chinese hackers abuse Microsoft APP-v tool to evade antivirus
February 19, 2025
Microsoft: Hackers steal emails in device code phishing attacks
February 15, 2025
PirateFi game on Steam caught installing password-stealing malware
February 15, 2025