Cyber Threat Report: 'Evasive Panda leverages Monlam Festival to target Tibetans'
Report Author | ESET RESEARCH |
---|---|
Publication Date | 2024-03-07 |
Original Reporting | Source |
Attributed to Nation | China |
Related Intrusion Sets | Evasive Panda |
This report by researchers at ESET describes a campaign which they attribute to the China-aligned APT Evasive Panda. The report describes a campaign against Tibetans in multiple countries and territories, by compromising a website associated with the Monlam Festival. The report provides technical analysis, and discusses the tactics, techniques and procedures (TTPs) associated with the campaign. The researchers also provide indicators of compromise (IoCs) to help defenders detect related activity.
Cyber Threat Graph Context
Explore how this report relates to the wider threat graph
Mitigations to defend against the techniques in this report
User Account Management
Manage the creation, modification, use, and permissions associated to user accounts.Privileged Account Management
Manage the creation, modification, use, and permissions associated to privileged accounts, including SYSTEM and root.Audit
Perform audits or scans of systems, permissions, insecure software, insecure configurations, etc. to identify potential weaknesses.Operating System Configuration
Make configuration changes related to the operating system or a common feature of the operating system that result in system hardening against techniques.Restrict File and Directory Permissions
Restrict access by setting directory and file permissions that are not specific to users or privileged accounts.Remote Data Storage
Use remote security log and sensitive file storage where access can be controlled better to prevent exposure of intrusion detection log data or sensitive information.Pre-compromise
This category is used for any applicable mitigation activities that apply to techniques occurring before an adversary gains Initial Access, such as Reconnaissance and Resource Development techniques.Restrict Web-Based Content
Restrict use of certain websites, block downloads/attachments, block Javascript, restrict browser extensions, etc.Data Loss Prevention
Use a data loss prevention (DLP) strategy to categorize sensitive data, identify data formats indicative of personal identifiable information (PII), and restrict exfiltration of sensitive data.(Citation: PurpleSec Data Loss Prevention)Encrypt Sensitive Information
Protect sensitive information with strong encryption.Network Intrusion Prevention
Use intrusion detection signatures to block traffic at network boundaries.Filter Network Traffic
Use network appliances to filter ingress or egress traffic and perform protocol-based filtering. Configure software on endpoints to filter network traffic.Network Segmentation
Architect sections of the network to isolate critical systems, functions, or resources. Use physical and logical segmentation to prevent access to potentially sensitive systems and information. Use a DMZ to contain any internet-facing services...Code Signing
Enforce binary and application integrity with digital signature verification to prevent untrusted code from executing.Execution Prevention
Block execution of code on a system through application control, and/or script blocking.Antivirus/Antimalware
Use signatures or heuristics to detect malicious software.Behavior Prevention on Endpoint
Use capabilities to prevent suspicious behavior patterns from occurring on endpoint systems. This could include suspicious process, file, API call, etc. behavior.Update Software
Perform regular software updates to mitigate exploitation risk.Exploit Protection
Use capabilities to detect and block conditions that may lead to or be indicative of a software exploit occurring.Application Isolation and Sandboxing
Restrict execution of code to a virtual environment on or in transit to an endpoint system.Vulnerability Scanning
Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.Restrict Registry Permissions
Restrict the ability to modify certain hives or keys in the Windows Registry.Application Developer Guidance
This mitigation describes any guidance or training given to developers of applications to avoid introducing security weaknesses that an adversary may be able to take advantage of.Identified MITRE ATT&CK Techniques
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1082 | System Information Discovery | Discovery |
T1053.005 | Scheduled Task | Execution, Persistence, Privilege Escalation |
T1074.001 | Local Data Staging | Collection |
T1020 | Automated Exfiltration | Exfiltration |
T1070.009 | Clear Persistence | Defense Evasion |
T1588.003 | Code Signing Certificates | Resource Development |
T1012 | Query Registry | Discovery |
T1567.002 | Exfiltration to Cloud Storage | Exfiltration |
T1005 | Data from Local System | Collection |
T1119 | Automated Collection | Collection |
T1083 | File and Directory Discovery | Discovery |
T1102 | Web Service | Command and Control |
T1095 | Non-Application Layer Protocol | Command and Control |
T1608.004 | Drive-by Target | Resource Development |
T1071.001 | Web Protocols | Command and Control |
T1036.004 | Masquerade Task or Service | Defense Evasion |
T1036.005 | Match Legitimate Name or Location | Defense Evasion |
T1027.009 | Embedded Payloads | Defense Evasion |
T1543.003 | Windows Service | Persistence, Privilege Escalation |
T1189 | Drive-by Compromise | Initial Access |
T1195.002 | Compromise Software Supply Chain | Initial Access |
T1140 | Deobfuscate/Decode Files or Information | Defense Evasion |
T1571 | Non-Standard Port | Command and Control |
T1518 | Software Discovery | Discovery |
T1057 | Process Discovery | Discovery |
T1572 | Protocol Tunneling | Command and Control |
T1583.006 | Web Services | Resource Development |
T1584.004 | Server | Resource Development |
T1587.001 | Malware | Resource Development |
T1585.003 | Cloud Accounts | Resource Development |
T1033 | System Owner/User Discovery | Discovery |
T1055.001 | Dynamic-link Library Injection | Defense Evasion, Privilege Escalation |
T1106 | Native API | Execution |
T1560 | Archive Collected Data | Collection |
T1049 | System Network Connections Discovery | Discovery |
T1562.004 | Disable or Modify System Firewall | Defense Evasion |
T1087.001 | Local Account | Discovery |
T1620 | Reflective Code Loading | Defense Evasion |
T1583.004 | Server | Resource Development |
T1070.004 | File Deletion | Defense Evasion |
T1574.002 | DLL Side-Loading | Defense Evasion, Persistence, Privilege Escalation |