current location:news > news > text
The National Internet Emergency Center releases an investigation report on the incident of a US cyber attack on an advanced material design institute in my country
2025-04-26 source:CCTV.com

CCTV News: On January 17, the National Internet Emergency Center CNCERT released a report, announcing the details of the US's cyber attack on an advanced materials design institute in my country. Previously, an announcement was issued on December 18, 2024 that two cyber attacks on large technology companies in the United States were discovered and dealt with.

1. Cyber ​​attack process

(I) Using vulnerabilities to attack intrude

On August 19, 2024, the attacker used the unit's electronic file system injection vulnerability to intrude the system and stole the system administrator account/password information. On August 21, 2024, the attacker used the stolen administrator account/password to log in to the management background of the attacked system.

(II) The software upgrade management server was implanted in the backdoor and Trojan program

At 12:00 on August 21, 2024, the attacker deployed the backdoor program and a customized Trojan program to receive stolen data in the electronic file system. To evade detection, these malicious programs exist only in memory and are not stored on the hard disk. The Trojan program is used to receive sensitive files stolen from the personal computer of the involved unit, with the access path of /xxx/xxxx?flag=syn_user_policy. The backdoor program is used to aggregate the stolen sensitive files and transfer them to the overseas country. The access path is /xxx/xxxStats.

(III) A large-scale personal host computer was implanted with Trojans

On November 6, 2024, November 8, 2024 and November 16, 2024, the attacker used a software upgrade function of the electronic document server to implant the special Trojan program into 276 hosts of the unit. The main function of the Trojan program is to scan sensitive files implanted into the host for stealing. The second is to steal other personal information such as the attacked person's login account secret. Trojan programs can be deleted as soon as possible.

2. Steal a large amount of commercial secret information

(I) Full disk scan of the victim unit host

The attacker used the Chinese IP springboard to log in to the software upgrade management server many times, and used the server to invade the victim unit's intranet host, and repeatedly scan the unit's intranet host hard disk to find potential attack targets and master the work content of the unit.

(II) Purpose clearly targeted theft

From November 6 to November 16, 2024, the attacker used three different springboard IPs to hack the software into the management server and implanted Trojans into the personal host. These Trojans have built-in specific keywords that are highly related to the work content of the victim unit. After searching for files containing specific keywords, the corresponding files will be stolen and transmitted to the overseas country. The keywords used in these three stealing activities are different, showing that the attacker has made careful preparations before each attack and is highly targeted. Three secret thefts stole a total of 4.98GB of important commercial information and intellectual property documents.

3. Characteristics of Attack Behavior

(I) Attack time

Analysis found that the attack time was mainly concentrated between 22:00 Beijing time and 8:00 the next day, compared with 10:00 to 20:00 in the daytime of the United States. The attack time was mainly distributed from Monday to Friday in the United States, and there was no attack on major holidays in the United States.

(II) Attack resources

The five springboard IPs used by the attacker are not duplicated at all. They are located in Germany and Romania, reflecting their high anti-traceability awareness and rich reserves of attack resources.

(III) Attack weapons

First, it is good at using open source or general tools to disguise and avoid traceability. The backdoor program found in the server of the unit involved this time is an open source general backdoor tool. In order to avoid being traced, attackers use open source or general-purpose attack tools in large quantities.

Secondly, important backdoors and Trojan programs are only run in memory and are not stored in hard disk, which greatly increases the difficulty of my analysis and discovery of their attack behavior.

(IV) Attack method

After the attacker attacked the unit's electronic file system server, he tampered with the system's client distribution program, and delivered Trojan programs to 276 personal hosts through the software client upgrade function, quickly and accurately attacked important users, and carried out information collection and stealing. The above attack methods fully demonstrate the powerful attack ability of the attack organization.

IV. Some springboard IP list

Reading ranking
Ministry of Foreign Affairs: China supports relevant parties to continue to maintain the ceasefire and negotiation momentum
The Ministry of Foreign Affairs responded to the annual military exercises between the United States and the Philippines: blindly tying each other on security will only lead to disaster.
Number one in the world, China’s opportunities... Multi-field development is flourishing, and “numbers” read the economy’s vitality
China's Eastern Theater Command organized the No. 133 naval fleet to sail through the Hengdang Waterway and conduct training activities in the Western Pacific waters.
News Featured
China's Eastern Theater Command organized the No. 133 naval fleet to sail through the Hengdang Waterway and conduct training activities in the Western Pacific waters.
Foreign businessmen go deep into the front line of "Intelligent Manufacturing in China", and the "traffic dividend" of the Canton Fair is accelerated into the "production and marketing effectiveness" of enterprises.
Buying globally and selling globally, the Consumer Expo witnessed China’s large market continuing to attract fans around the world with an open attitude
The 6th Consumer Expo comes to an end, global merchants share new opportunities in the Chinese market
24 hours hotspot
1China's Eastern Theater Command organized the No. 133 naval fleet to sail through the Hengdang Waterway and conduct training activities in the Western Pacific waters.
2Foreign businessmen go deep into the front line of "Intelligent Manufacturing in China", and the "traffic dividend" of the Canton Fair is accelerated into the "production and marketing effectiveness" of enterprises.
3Buying globally and selling globally, the Consumer Expo witnessed China’s large market continuing to attract fans around the world with an open attitude
4The 6th Consumer Expo comes to an end, global merchants share new opportunities in the Chinese market
Unified Service Email:chinanewsonline@yeah.net
Copyright@ www.china-news-online.com