Wednesday, April 24, 2024
HomeCyber Security BlogsAPT Group Naikon Is Using Nebulae Backdoor Now

APT Group Naikon Is Using Nebulae Backdoor Now

A Chinese espionage group from China   has been employing actively a new technique of backdoor to run multiple cyber espionage operations that are targeting military organizations in South East Asia. The backdoor is used to gain persistence on infected systems and it has been identified as nebulae.

The Discovery-

Naikon APT conducted malicious activity between June 2019 and March 2021.

  •       This APT group used the Aria-Body loader and Nebulae in the first stage of the attack at the beginning of their operation in 2019.
  •       From September 2020, this group started including the RainyDay backdoor in its toolkit. The attribution to Naikon is based on the artifacts and the C2 servers used in the attack.
  •       The APT group has started the delivery of RainyDay (aka FoundCore) as a first stage payload for the propagation of the second stage malware and tools, including the Nebulae backdoor.

About Nebulae-

  •       It can collect information of the LogicalDrive, manipulate files and folders, conduct uploading and downloading of files from the C2 servers. It can also terminate, list or execute the processes on the infected devices.
  •       The malware also adds a registry key which runs on the system automatically after the system reboots after login. This technique works as a backup access point for the victims in case of an adverse scenario for the threat actor.

Some additional insights-

Naikon has targeted many organizations that were located around the South China Sea, like Singapore, Indonesia, Malaysia and the Philippines. It mainly focuses on military entities of the government.

Conclusion-

Naikon APT group has been running silent operations for over two years and has attacked many organizations through cyber espionage operations. This group still poses a threat to the military organization of SouthEast Asia. So, it is important for the cyber security experts and professionals to keep their eyes open for such attacks.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments

Izzi Казино онлайн казино казино x мобильді нұсқасы on Instagram and Facebook Video Download Made Easy with ssyoutube.com
Temporada 2022-2023 on CamPhish
2017 Grammy Outfits on Meesho Supplier Panel: Register Now!
React JS Training in Bangalore on Best Online Learning Platforms in India
DigiSec Technologies | Digital Marketing agency in Melbourne on Buy your favourite Mobile on EMI
亚洲A∨精品无码一区二区观看 on Restaurant Scheduling 101 For Better Business Performance

Write For Us