The China-based Winnti Group has targeted Japanese organizations in a recent cyberattack campaign known as “RevivalStone,” in the manufacturing, materials, and energy sectors. With the increasing sophistication of such threats, organizations must stay proactive, employing cutting-edge security measures to detect, mitigate, and prevent these targeted cyber intrusions. The Winnti Group, known for its involvement in both cybercrime and espionage, has been linked to APT41, a subgroup with ties to private contractors operating on behalf of the Chinese government. It receives POST requests with specific parameters, enabling various attack activities on the target host, ultimately leading to the deployment of Winnti malware. While the Winnti Group initially focused on the gaming industry around 2010 but has since expanded its targets to organizations handling intellectual property across various fields. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. This loader decrypts DAT files to initiate the Winnti RAT, which in turn deploys the Winnti Rootkit using the amonitor.sys installer, ensuring deep system infiltration and persistence. The Winnti Group’s reliance on advanced malware and WebShells shows the critical need for strong cybersecurity defenses. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. This campaign, confirmed in March 2024, utilizes a new version of the Winnti malware with enhanced capabilities. The RevivalStone campaign begins with an SQL injection vulnerability exploit in the target organization’s ERP system, allowing the attackers to deploy a WebShell. The Winnti Loader is designed to evade detection by copying legitimate DLLs to the System32 folder and loading them dynamically. The attackers then deploy Winnti malware as a foothold for further attacks. Tushar is a Cyber security content editor with a passion for creating captivating and informative content.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 13 Feb 2025 13:45:24 +0000