<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/Winnti/Hand%20on%20keyboard.jpg" alt="Hand on keyboard.jpg" width="455" height="303"> <p>The Winnti group is a Chinese-linked cybercriminal group that is most well-known for its 2011 attacks against online video game producers.</p> <!--more--> <p>These attacks were committed with the intent of stealing digital certificates used to sign software. With these compromised certificates in hand, the group would then use them to attack other video game companies to steal their certificates as well.</p> <p>In addition to a company's certificates, the source code for their video games was targeted as well, possibly to search for vulnerabilities within the game to exploit for monetary gain. One of the targeted companies <a href="https://kasperskycontenthub.com/wp-content/uploads/sites/43/vlpdfs/winnti-more-than-just-a-game-130410.pdf">described</a> how the attackers were trying to acquire in-game currency illegally, which they could then try to convert into real-currency. The Winnti Group was also able to successfully distribute Trojans to players of a popular online game by deploying malware on the game's official update server.</p> <p>After the attacks on video game producers, the group and their stolen certificates were used to <a href="https://securelist.com/games-are-over/70991/">attack pharmaceutical companies</a>, as well as to <a href="https://threatpost.com/stolen-winnti-certificates-used-watering-hole-attack-against-tibet-orphans-site-041213/77727/">target activists</a> supporting Tibet and Uyghur.</p> <p>The latest update to the Winnti group's backdoor <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/winnti-abuses-github/">uses GitHub</a> to receive directives as part of the Command and Control (C&amp;C) chain. To find out where it needs to connect to next, the malware will access an HTML page stored within a GitHub repo. This page contains an encrypted string that once decrypted, will show the IP address and port number that it will receive commands from.</p> <p>This update helps the malware mask its network traffic, as accessing GitHub is unlikely to raise many red flags within a corporate environment.</p> <p>Enabling TSCritical targets in policies for ThreatSTOP DNS and IP Firewall Services protect against Winnti. If you do not have a ThreatSTOP account, for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to a&nbsp;<a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">DNS</a> or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub. Or contact our&nbsp; team.</p></span>