Chinese Hackers Allegedly Target Russia in Cyberattack
Moscow-based cybersecurity provider Kaspersky Lab has recently revealed that multiple systems used by government bodies and IT companies in Russia have been compromised by Chinese hackers. The cyberattack was carried out using a backdoor malware known as "GrewApacha," a type of software that allows unauthorized access to computers. This malware has been attributed since 2021 to APT31, a Chinese cyber-espionage group believed to be linked to China's Ministry of State Security (MSS).
How the Attack Unfolded
The attackers reportedly used phishing emails to infiltrate devices. Phishing is a technique where attackers disguise themselves as trustworthy entities to trick individuals into divulging sensitive information. In this case, emails contained malicious shortcut files as attachments. When recipients clicked on these files, the malware was installed, allowing attackers to control the infected systems remotely via Dropbox cloud storage. This approach enabled the download of additional malicious software, including tools associated with APT31 and an updated version of another malware known as CloudSorcerer.
Understanding the Threat
A Trojan, like GrewApacha, is a malicious program that masquerades as legitimate software. For instance, it could look like a regular software update but, once installed, it can spy on users, steal data, and grant unauthorized access to attackers without the user's knowledge. According to a report by SecureList, the attack method used in this campaign mirrors tactics previously employed against a U.S. organization. The updated CloudSorcerer malware is described as "a sophisticated toolset targeting Russian government entities," adaptable to its environment and using complex techniques for communication.
Geopolitical Implications
The Russian and Chinese foreign ministries have not yet issued any comments on these allegations. This incident adds to a series of warnings by intelligence agencies, including the Five Eyes alliance—comprising the U.S., the U.K., Canada, Australia, and New Zealand—about China's extensive use of technology in cyber espionage. Earlier this year, leaked information indicated involvement by I-Soon, a Chinese contractor associated with the MSS, in a global surveillance campaign targeting various entities, including foreign governments and private citizens.
The Chinese foreign ministry has previously stated its opposition to all forms of cyberattacks, asserting its commitment to cracking down on such activities "in accordance with the law." This incident highlights the persisting challenges of cybersecurity in an era where geopolitical tensions often extend into the digital realm.