Ransomware, Threat Intelligence

RA World Ransomware Intrusion Involved Chinese Cyberespionage Tools

Chinese cyber threat

Malicious actors leveraged a Chinese cyberespionage operation-linked tool to facilitate an RA World ransomware intrusion against an Asian software and services organization in November, Security Affairs reports.

After initially focusing on cyberespionage in an attack against a Southeastern European country's foreign ministry in July, threat actors aimed to compromise the Asian firm by exploiting a Palo Alto Networks PAN-OS flaw and pilfering Amazon AWS S3 bucket data and credentials before launching RA World ransomware, according to an analysis from Broadcom's Symantec Threat Hunter Team.

The attack also involved the deployment of a Toshiba executable enabling the sideloading of a PlugX malware variant similar to the one used by Chinese cyberespionage gang Mustang Panda, also known as Fireant and Earth Preta.

While such an RA World ransomware attack was previously linked by Palo Alto Networks to Chinese threat operation Bronze Starlight, also known as Emperor Dragonfly, Chinese cyber spies were noted by Symantec researchers to have an unclear motive in exploring ransomware ventures.

"The most likely scenario is that an actor, possibly one individual, was attempting to make some money on the side using their employer’s toolkit," researchers said.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.