Cyber Threat Report: 'Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear'

Report Author TrendMicro
Publication Date 2024-04-11
Original Reporting Source
Related Intrusion Sets BlackTech , Earth Hundun
Victim Sectors Technology, National Government

This blog post from researchers at Trend Micro discusses the cyberespionage group Earth Hundun and its malware, Waterbear and Deuterbear, which they have observed targeting technology, research, and government sectors in the Asia-Pacific region. According to the post, Waterbear includes complex anti-detection techniques and has evolved across over 10 versions since 2009, with the latest updates further enhancing evasion tactics. The researchers also refer to the latest version as Deuterbear. The blog provides detailed technical analysis of the malware and link to indicators of compromise.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1005 Data from Local System Collection
T1016.001 Internet Connection Discovery Discovery
T1057 Process Discovery Discovery
T1480 Execution Guardrails Defense Evasion
T1622 Debugger Evasion Defense Evasion, Discovery
T1547.012 Print Processors Persistence, Privilege Escalation
T1036.005 Match Legitimate Name or Location Defense Evasion
T1071.001 Web Protocols Command and Control
T1083 File and Directory Discovery Discovery
T1140 Deobfuscate/Decode Files or Information Defense Evasion
T1132.002 Non-Standard Encoding Command and Control
T1129 Shared Modules Execution
T1049 System Network Connections Discovery Discovery
T1027.001 Binary Padding Defense Evasion
T1573 Encrypted Channel Command and Control
T1082 System Information Discovery Discovery
T1574.002 DLL Side-Loading Defense Evasion, Persistence, Privilege Escalation
T1497.003 Time Based Evasion Defense Evasion, Discovery
T1012 Query Registry Discovery
T1041 Exfiltration Over C2 Channel Exfiltration
T1106 Native API Execution