Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

What to know about the dating app Tea and its hacked data

July 26, 2025

If you don’t have diabetes, do you really need a continuous glucose monitor?

July 26, 2025

Blue Ivy shines on stage during Beyoncé’s Cowboy Carter tour

July 26, 2025
Facebook X (Twitter) Instagram
Trending
  • What to know about the dating app Tea and its hacked data
  • If you don’t have diabetes, do you really need a continuous glucose monitor?
  • Blue Ivy shines on stage during Beyoncé’s Cowboy Carter tour
  • Judge pauses cancellation of humanities grants
  • African Americans move to Kenya to connect with heritage and culture
  • ‘South Park’ Creators Trey Parker and Matt Stone Are Now Billionaires
  • How Jeffrey Epstein Got So Rich
  • Despite rainy weather, Catholics in a Paraguayan town dress as birds to honor their patron saint
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Sunday, July 27
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Chinese Hackers Hit Drone Sector in Supply Chain Attacks
Cybersecurity

Chinese Hackers Hit Drone Sector in Supply Chain Attacks

adminBy adminMay 15, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 36


A Chinese threat actor was seen disrupting the drone supply chain in multi-wave attacks against various organizations in Taiwan and South Korea, Trend Micro reports.

Dubbed Earth Ammit and believed to be tied to Chinese APTs, the hacking group was seen launching two attack campaigns between 2023 and 2024, targeting organizations across multiple sectors to compromise trusted supply chains.

Named Tidrone and Venom, the campaigns hit military, heavy industry, software services, satellite, technology, media, and healthcare organizations, using both open source and custom tools to achieve malicious goals.

The Tidrone campaign was initially detailed in September 2024, after the Chinese hackers were seen abusing enterprise resource planning (ERP) software and remote desktop access to deploy the Cxclnt and Clntend backdoors, steal information, and disable security protections.

In a fresh report, Trend Micro explains that the Venom campaign occurred prior to Tidrone, targeting service providers and technology companies in Taiwan, and heavy industry firms in South Korea.

“Earth Ammit’s strategy centered around infiltrating the upstream segment of the drone supply chain. By compromising trusted vendors, the group positioned itself to target downstream customers – demonstrating how supply chain attacks can ripple out and cause broad, global consequences,” Trend Micro notes.

Earth Ammit, the cybersecurity firm says, used a combination of two types of supply chain attack techniques in these campaigns: the group tampered with legitimate software used by the target companies and compromised upstream vendors to deliver malware to the connected systems.

The Venom campaign relied on web server vulnerability exploitation for webshell deployment, followed by the deployment of open source proxy tools and remote access tools to achieve persistence. Next, the attackers harvested credentials from the victim, to use them in attacks against downstream customers.

Advertisement. Scroll to continue reading.

In Tidrone attacks, the hackers targeted service providers for code injection and the distribution of malware to their customers. Next, they deployed their customized backdoors for cyberespionage purposes, Trend Micro notes.

Follow-up activities included privilege escalation, establishing persistence, credential dumping, the disabling of security software, and information collection.

In addition to Cxclnt and Clntend, Earth Ammit used customized tools such as Screencap (screen capture tool) and Venfrpc (fast reverse proxy), both adapted from utilities available on GitHub. The threat actor was also seen relying on fiber-based techniques for evasion.

“In the Venom campaign, Earth Ammit primarily leveraged open-source tools, likely due to their accessibility, low cost, and ability to blend in with legitimate activity. However, as the operation matured, they shifted toward deploying custom-built malware – notably in the Tidrone campaign – to increase precision and stealth in targeting sensitive sectors,” Trend Micro notes.

Related: Chinese APT’s Adversary-in-the-Middle Tool Dissected

Related: US-China Competition to Field Military Drone Swarms Could Fuel Global Arms Race

Related: Popular Scraping Tool’s NPM Package Compromised in Supply Chain Attack

Related: AI Hallucinations Create a New Software Supply Chain Threat



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

‘South Park’ Creators Trey Parker and Matt Stone Are Now Billionaires

July 25, 2025

After signing a new $1.5 billion deal with Paramount, Trey Parker and Matt Stone are…

How Jeffrey Epstein Got So Rich

July 25, 2025

Vanta Raises Funds At $4 Billion Valuation—Despite Not Needing Cash

July 23, 2025

Former Citigroup Chair Sandy Weill’s New $100 Million Gift To Harness AI For A West Coast Cancer Hub

July 23, 2025
Our Picks

What to know about the dating app Tea and its hacked data

July 26, 2025

If you don’t have diabetes, do you really need a continuous glucose monitor?

July 26, 2025

Blue Ivy shines on stage during Beyoncé’s Cowboy Carter tour

July 26, 2025

Judge pauses cancellation of humanities grants

July 25, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.