PwC security analysts have discovered Chinese APT group KeyBoy back in the wild with new tools and techniques crafted to attack Western organizations.

It’s believed the hacking group is based in China and mainly engage in espionage activity. Historically the group has targeted organizations residing in Taiwan, Tibet, and the Philippines, but the latest campaign shows they are going after mostly Western organizations, likely for corporate espionage reasons.

KeyBoy was found to be using a uniquely crafted Word doc using the Dynamic Data Exchange (DDE) protocol to download remote payloads. Once the malware is installed, the original DLL is deleted, with popup blocked so the user has no clue what’s happening.

This malware has been designed to take screenshots, gather system information, browse and download files, shutdown & reboot victim machines, and use customer SSL libraries to hide C&C traffic.

The group dates as far back as 2013 when found targeting Southeast Asian victims through malicious Word documents.

The good news for organizations is that there are technologies out there designed to detect abnormal occurrences within systems. File Integrity Monitoring records any changes to the file systems and the systems’ configuration settings. This tool is designed to ensure that a device remains hardened and free of vulnerabilities at all times and that file systems are free of any malware. Meaning that even if some form of APT malware managed to infiltrate a critical server, well-implemented FIM would detect file system changes before any rootkit protective measures that may be employed by the malware can kick in.

 

Read the article in InfoSecurity Magazine

 

 

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.