<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img src="https://info.threatstop.com/hubfs/phishing2.jpg" alt="phishing2.jpg"></p> <p>&nbsp;</p> <p>A cyber group attributed to Chinese APT activity has used the downloader <strong>ZeroT&nbsp;</strong>&nbsp;since February 2016, as <a href="https://www.proofpoint.com/us/threat-insight/post/APT-targets-russia-belarus-zerot-plugx" target="_blank">reported</a> by Proofpoint in 2017.</p> <!--more--> <p>The first wave of the 2017 campaigns started in February. Targets were entities related to military and aerospace interests in Russia and Belarus. However, in <a href="https://www.proofpoint.com/us/threat-insight/post/apt-targets-financial-analysts" target="_blank">April</a>, the campaign switched targets, including analysts at top Russian financial firms and firms in neighboring countries.</p> <p>The attacks have two primary vectors. First, a spear phishing campaign that, upon success, installed <strong>ZeroT</strong> into the targeted system. Later campaigns used spear phishing emails including a Microsoft Word attachment. This attachment exploited the <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0199" target="_blank">CVE-2017-0199</a> vulnerability.</p> <p>CVE-2017-0199 allows a bad actor to download and execute a VisualBasic Script, containing PowerShell commands. These commands fire when the user opens a document containing the embedded exploit. PowerShell then downloads an HTML Application File (<a href="https://dochub.threatstop.com/display/TS/H#H-_hta" target="_blank">HTA</a>). The HTA file then executes a VB Script which downloads and runs a script to then download <strong>ZeroT</strong>.</p> <p>In both scenarios, the end goal is not infection with <strong>ZeroT</strong>, but rather with <strong>PlugX</strong> <strong>Remote Access Trojan</strong> (<a href="https://dochub.threatstop.com/display/TS/R#R-_rat" target="_blank">RAT</a>). Upon infestation, <strong>PlugX</strong> grants network access to cyber criminals. These criminals can use the software, along with a bevy of modules, to scan for banking information. The modules, detailed by <a href="https://www.lastline.com/labsblog/an-analysis-of-plugx-malware" target="_blank">LastLine</a>, allow <strong>PlugX</strong> to scan for sensitive file contents, take screenshots, look for shared network resources, connect with SQL databases, and log keystrokes on infected machines. This data is then exfiltrated to a <a href="https://dochub.threatstop.com/display/TS/C#C-_c&amp;c" target="_blank">C&amp;C</a> controlled by the cyber group.&nbsp;</p> <p>Enabling <strong>TSCritical</strong> targets in policies for ThreatSTOP DNS and IP Defense Services protect against <strong>ZeroT</strong> and <strong>PlugX</strong>. If you do not have a ThreatSTOP account,&nbsp; for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to a <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy" target="_blank">DNS</a> or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall" target="_blank">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub. Or contact our&nbsp; team.</p></span>