Winnti APT group docks in Sri Lanka for new campaign
In early August, the Malwarebytes Threat Intelligence team identified a new attack targeting government entities in Sri Lanka. The threat actors used multiple layers of protection and techniques to make analysis harder and hide their final payload.
However, based on tactic, techniques and procedures (TTPs) as well as code similarities we believe that this attack falls under the Winnti umbrella. Winnti is a Chinese state-sponsored effort of different threat actors that have conducted cyber espionage and financially motivated operations since 2012. Winnti remains active and its arsenal keeps growing as one of the most sophisticated groups nowadays. Sri Lanka’s location in South Asia is strategic for China as it has open access to the Indian Ocean and is close to India.
We identified several payloads being dropped in this campaign, including the famous KeyPlug malware but more interestingly, we found a new backdoor that we call DBoxAgent due to its use of Dropbox as a command and control server. We shared our initial findings with Dropbox who immediately took action to stop this malicious activity. We would like to thank the Dropbox threat intelligence team for their response.
Here are the highlights of our this investigation:
- To our knowledge, a Winnti faction is targeting Sri Lanka for the first time
- The attack time frame coincides with a major geopolitical event involving China and Sri Lanka
- The threat actors created a new backdoor and used Dropbox for their command and control infrastructure
Download the full report here.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon using the button below
To keep up to date follow us on the below channels.