Cyberwarfare / Nation-State Assaults
,
Fraud Administration & Cybercrime
,
Authorities
3-12 months Espionage Marketing campaign Focused Taiwanese Corporations

A hacking group with hyperlinks to the Chinese language authorities is behind a three-year-long espionage marketing campaign that focused Taiwanese firms with a customized malware variant, researchers stated.
See Additionally: Compliance Workforce Information for Evasion Prevention & Sanction Publicity Detection
Google Cloud attributed the marketing campaign to APT24, a China-based hacking group that has been energetic since 2011. The most recent marketing campaign, which started in 2022, used a number of assault vectors to focus on Taiwanese firms utilizing a malware variant referred to as BADAUDIO.
“In July 2024, APT24 compromised a regional digital advertising agency in Taiwan – a provide chain assault that impacted greater than 1,000 domains. Notably, the agency skilled a number of re-compromises during the last 12 months, demonstrating APT24’s persistent dedication to the operations,” Google stated.
The hacking group, also called G0011, PITTY PANDA and Temp.Pittytiger, is essentially centered on mental property theft referring to particular initiatives of strategic curiosity to China. The group has primarily focused organizations in Taiwan and america within the healthcare, building and engineering, mining and nonprofit sectors.
The hacking group deployed a number of variants of BADAUDIO, which is a first-stage downloader that collects primary system info to create persistence inside sufferer networks. As a result of the hackers steadily shifted their preliminary entry strategies, in addition to mixed it with malware upgrades, the hackers remained largely undetected, Google stated.
For example, the marketing campaign initially started with the attackers counting on a watering gap approach, through which the attacker injected a malicious JavaScript payload to compromise 20 web sites. The script contained the FingerprintJS library to determine victims who visited the web sites, who had been then proven a pop-up message that downloaded BADAUDIO malware, Google Cloud stated.
Round July 2024, the attackers switched to produce chain compromises. The ways concerned hackers injecting malicious script right into a extensively used JavaScript library supplied by a goal. Utilizing typosquatting that imitated a professional content material supply community, the attackers then delivered BADAUDIO.
By Might of this 12 months, the hackers switched to social engineering that used Google Drive and OneDrive to distribute encrypted archives containing BADAUDIO.
After preliminary entry, hackers deployed the malware by way of search order hijacking, a tactic through which hackers make sure that Home windows executes a hacker-planted, dynamic-link library file fairly than a professional software program file.
The malware then collects hostname, username and system structure knowledge. This info is then hashed and embedded inside a cookie parameter within the command-and-control request header, which additional helped the hackers to stay beneath the radar, Google stated.
“This exercise follows a broader development GTIG has noticed of PRC-nexus risk actors more and more using stealthy ways to keep away from detection,” Google stated. Google stated it took steps to disrupt the malware infrastructure disruption and it alerted clients affected by breaches.









