Chinese 'Aoqin Dragon' gang runs undetected ten-year espionage spree
Researcher spots it targeting Asian government and telco targets, probably with Beijing's approval
Threat researcher Joey Chen of Sentinel Labs says he's spotted a decade worth of cyber attacks he's happy to attribute to a single Chinese gang.
Chen has named the group Aoqin Dragon, says its goal is espionage, and that it prefers targets in Australia, Cambodia, Hong Kong, Singapore, and Vietnam.
The gang is fond of attacks that start by inducing users to open poisoned Word documents that install a backdoor – often a threat named Mongall or a modified version of the open source Heyoka project.
The group's lures have changed over the years. Sometimes its lures are document on regional political topics, while on other occasions the gang has used pornographic content as a lure.
The initial incursion sometimes installs a fake removable device that, when clicked, installs malware. Fake anti-virus apps are another tool the group deploys.
Once the gang compromises a machine, it seeks wider network access so the gang can find juicy info.
- China-linked Twisted Panda caught spying on Russian defense R&D
- APT gang 'Sidewinder' goes on two-year attack spree across Asia
- China turns cyber-espionage eyes to Russia as Ukraine invasion grinds on
Chen wrote that he's seen Aoqin Dragon target "government, education, and telecommunication organizations."
"The targeting of Aoqin Dragon closely aligns with the Chinese government's political interests," he wrote, adding "Considering this long-term effort and continuous targeted attacks for the past few years, we assess the threat actor's motives are espionage-oriented."
China is often credibly accused of using foul means to acquire secrets from private sector and government organizations. Chen thinks Aoqin Dragon will continue its work. "We assess it is likely they will also continue to advance their tradecraft, finding new methods of evading detection and stay longer in their target network," he wrote.
News of the group's activities follows three US government agencies – the NSA, FBI and CISA – jointly announcing that China-backed actors are attacking routers and network attached storage devices to exfiltrate data from carriers and network services providers.
The three agencies stated that the attacks target devices that haven't patched flaws identified between 2017 and 2021. Aoqin Dragon's method of using malicious Microsoft Word documents also relies on users not doing the right thing and either patching or upgrading their apps to safe editions. ®
- Black Hat
- Bug Bounty
- China Mobile
- China telecom
- China Unicom
- Common Vulnerability Scoring System
- Cybersecurity and Infrastructure Security Agency
- Cybersecurity Information Sharing Act
- Cyberspace Administration of China
- Data Breach
- Data Protection
- Data Theft
- Digital certificate
- Great Firewall
- Hong Kong
- Identity Theft
- Kenna Security
- Palo Alto Networks
- Remote Access Trojan
- RSA Conference
- Semiconductor Manufacturing International Corporation
- Trusted Platform Module
- Uyghur Muslims
- Zero trust