Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Anthropic, Google score win by nabbing OpenAI-backed Harvey as a user

May 13, 2025

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday

May 13, 2025

US and Saudi Arabia agree to $142bn weapons sale during Trump visit | Donald Trump News

May 13, 2025
Facebook X (Twitter) Instagram
Trending
  • Anthropic, Google score win by nabbing OpenAI-backed Harvey as a user
  • Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
  • US and Saudi Arabia agree to $142bn weapons sale during Trump visit | Donald Trump News
  • Trump admin officially rescinds Biden’s AI diffusion rules
  • Audible is expanding its AI-narrated audiobook library 
  • See the looks from Cannes’ opening ceremony after the festival banned big dresses and nude looks
  • Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments
  • Why has Trump given white South Africans refugee status? | Refugees News
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Tuesday, May 13
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Chinese Hacking Group MirrorFace Targeting Europe
Cybersecurity

Chinese Hacking Group MirrorFace Targeting Europe

adminBy adminMarch 19, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 36


Chinese APT actor MirrorFace has been observed targeting a Central European diplomatic institute in relation to the upcoming Expo 2025 event, cybersecurity firm ESET reports.

Also known as Earth Kasha, MirrorFace is operating under the China-linked state sponsored hacking group APT10, focusing on targeting Japanese entities such as the country’s Foreign and Defense ministries, as well as the country’s space agency, politicians, journalists, private companies, and think tanks.

Dubbed Operation AkaiRyū (RedDragon in Japanese), the campaign against the diplomatic institute is the first known MirrorFace attack against a European entity, and has revealed updated tactics, techniques, and procedures (TTPs), and the addition of new tools to the group’s inventory.

MirrorFace has started using APT10’s former signature backdoor Anel (also known as Uppercut), as well as a customized version of AsyncRAT. The attacks started with carefully crafted spearphishing emails carrying malicious attachments.

The use of Anel strengthens the hypothesis that MirrorFace is a subgroup of APT10, given that the backdoor is exclusive to this Chinese state-sponsored group, ESET notes.

As part of attacks observed between June and September 2024, MirrorFace also deployed a customized variant of AsyncRAT, using a complex execution chain to run it in the Windows Sandbox, and used VS Code for its remote tunnels feature, for stealthy access and code execution.

While the hacking group used Anel in the first stages of the attacks, it also deployed its flagship backdoor HiddenFace at a later stage, further bolstering persistence on the infected systems. In 2024, however, the group did not use the LodeInfo backdoor.

In June 2024, the APT was seen targeting two employees of a Japanese research institute in an attack chain that used a signed McAfee executable to load Anel. In August, the group targeted a Central European diplomatic institute with a malicious OneDrive link leading to an Anel infection.

Advertisement. Scroll to continue reading.

Other tools and malware used in these attacks include Anelldr (an Anel loader), HiddenFace (backdoor), FaceXInjector (HiddenFace loader), AsyncRAT (delivered using several files and executed inside Windows Sandbox, which is manually enabled and requires a reboot), and Hidden Start (a tool for bypassing UAC).

As part of the diplomatic institute attack, MirrorFace stole data from one system (including contact information, autofill data, keywords, and stored credit card information from Chrome) and set up various tools on a second system to gain deeper network access.

“During this attack, the threat actor used the upcoming World Expo 2025 – to be held in Osaka, Japan – as a lure. This shows that even considering this new broader geographic targeting, MirrorFace remains focused on Japan and events related to it,” ESET notes.

Related: Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

Related: Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job

Related: CISA Warns of Old jQuery Vulnerability Linked to Chinese APT

Related: Chinese Hackers Exploiting Critical Vulnerability in Array Networks Gateways



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday

May 13, 2025

Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments

May 13, 2025

SAP Patches Another Critical NetWeaver Vulnerability

May 13, 2025

Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023

May 13, 2025

Marks & Spencer Says Data Stolen in Ransomware Attack

May 13, 2025

Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying 

May 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Skechers’ Greenbergs Set To Pocket Up To $1.1 Billion From Sale To 3G

May 6, 2025

Skechers founders Robert Greenberg (left) and Michael Greenberg (right) started the brand more than 30…

Trump Organization Admits President Still Controls His Business

May 6, 2025

Forbes Richest Person In Every State 2025

April 30, 2025

These Billionaire Signers Of The Giving Pledge Signers On Why The Philanthropy Group Still Matters

April 29, 2025
Our Picks

Anthropic, Google score win by nabbing OpenAI-backed Harvey as a user

May 13, 2025

Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday

May 13, 2025

US and Saudi Arabia agree to $142bn weapons sale during Trump visit | Donald Trump News

May 13, 2025

Trump admin officially rescinds Biden’s AI diffusion rules

May 13, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

Anthropic, Google score win by nabbing OpenAI-backed Harvey as a user

May 13, 2025

Trump admin officially rescinds Biden’s AI diffusion rules

May 13, 2025

Audible is expanding its AI-narrated audiobook library 

May 13, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.