APT groups linked to China are using PortDoor backdoor to target Russian defence sector. The researchers who were responsible for the detection of the campaign did not name any particular APT group of China. However, they did make some educated guesses.
What has happened?
Cybereason Nocturnus Team found that the APT group has been targeting mainly one of the main centers where submarines for the Russian navy is designed. It is known as Rubin Design Bereau.
- The general director of Rubin Design Bureau in Saint Petersburg received a spear phishing message from the attacker.
- These messages used the malicious RTF document containing information about the autonomous vehicle made to be operated underwater.
- The Cybereason Nocturnus Team identified the RTF document while analysis of the devenlopment in the RoyalRoad tool or 8.t Dropper and RTF exploit builder.
- The documents were built using exploit builder the CVE-2018-0798, CVE-2018-0802, and CVE-2017-11882 vulnerabilities.
Some attribution of the attack-
- RoyalRoad v7 is the creator of the RTF file that was used in the attack.
- Tonto Team and TA428 had attachment with the previous attacks associated with the Russian defence organisations.
Conclusion-
Due to lack of information and proof, the attack could not be attributed to any particular threat actor. There are a few points that indicate towards the association of Tonto Team (aka TA428). Moreover, it cannot be denied that there can be any new threat group. All these points towards the increasing sophistication and the dominance of the Chinese threat actors in the cyberespionage realm globally.