By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
Computing

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

News Room
Last updated: 2025/02/18 at 7:28 AM
News Room Published 18 February 2025
Share
SHARE

Feb 18, 2025Ravie LakshmananMalware / Network Security

The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024.

The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to be a subset within the APT41 cyber espionage group, by Cybereason under the name Operation CuckooBees, and by Symantec as Blackfly.

APT41 has been described as a highly skilled and methodical actor with the ability to mount espionage attacks as well as poison the supply chain. Its campaigns are often designed with stealth in mind, leveraging a bevy of tactics to achieve its goals by using a custom toolset that not only bypasses security software installed in the environment, but also harvests critical information and establishes covert channels for persistent remote access.

Cybersecurity

“The group’s espionage activities, many of which are aligned with the nation’s strategic objectives, have targeted a wide range of public and private industry sectors around the world,” LAC said.

“The attacks of this threat group are characterized by the use of Winnti malware, which has a unique rootkit that allows for the hiding and manipulation of communications, as well as the use of stolen, legitimate digital certificates in the malware.”

Winnti, active since at least 2012, has primarily singled out manufacturing and materials-related organizations in Asia as of 2022, with recent campaigns between November 2023 and October 2024 targeting the Asia-Pacific (APAC) region exploiting weaknesses in public-facing applications like IBM Lotus Domino to deploy malware as follows –

  • DEATHLOTUS – A passive CGI backdoor that supports file creation and command execution
  • UNAPIMON – A defense evasion utility written in C++
  • PRIVATELOG – A loader that’s used to drop Winnti RAT (aka DEPLOYLOG) which, in turn, delivers a kernel-level rootkit named WINNKIT by means of a rootkit installer
  • CUNNINGPIGEON – A backdoor that uses Microsoft Graph API to fetch commands – file and process management, and custom proxy – from mail messages
  • WINDJAMMER – A rootkit with capabilities to intercept TCPIP Network Interface, as well as create covert channels with infected endpoints within intranet
  • SHADOWGAZE – A passive backdoor reusing listening port from IIS web server

The latest attack chain documented by LAC has been found to exploit an SQL injection vulnerability in an unspecified enterprise resource planning (ERP) system to drop web shells such as China Chopper and Behinder (aka Bingxia and IceScorpion) on the compromised server, using the access to perform reconnaissance, collect credentials for lateral movement, and deliver an improved version of the Winnti malware.

The intrusion’s reach is said to have been expanded further to breach a managed service provider (MSP) by leveraging a shared account, followed by weaponizing the company’s infrastructure to propagate the malware further to three other organizations.

LAC said it also found references to TreadStone and StoneV5 in the RevivalStone campaign, with the former being a controller that’s designed to work with the Winnti malware and which was also included in the I-Soon (aka Anxun) leak of last year in connection with a Linux malware control panel.

Cybersecurity

“If TreadStone has the same meaning as the Winnti malware, it is only speculation, but StoneV5 could also mean Version 5, and it is possible that the malware used in this attack is Winnti v5.0,” researchers Takuma Matsumoto and Yoshihiro Ishikawa said.

“The new Winnti malware has been implemented with features such as obfuscation, updated encryption algorithms, and evasion by security products, and it is likely that this attacker group will continue to update the functions of the Winnti malware and use it in attacks.”

The disclosure comes as Fortinet FortiGuard Labs detailed a Linux-based attack suite dubbed SSHDInjector that’s equipped to hijack the SSH daemon on network appliances by injecting malware into the process for persistent access and covert actions since November 2024.

The malware suite, associated with another Chinese nation-state hacking group known as Daggerfly (aka Bronze Highland and Evasive Panda), is engineered for data exfiltration, listening for incoming instructions from a remote server to enumerate running processes and services, perform file operations, launch terminal, and execute terminal commands.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Ransomware tired? This solution will change everything for your company
Next Article iPhone ‘leak’ reveals ultra-thin overhaul – but cheaper model is launching first
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Zopa raises £80m in first LSE bond listing  – UKTN
News
13 Best Voice Over Software for High-Quality Audio Production
Computing
How to troubleshoot Wi-Fi problems on iPhone & iPad
News
Samsung Galaxy S25 Edge: Why a Smaller Battery Isn’t a Big Deal
News

You Might also Like

Computing

13 Best Voice Over Software for High-Quality Audio Production

34 Min Read
Computing

7 Ways to Grow Client Value and Monthly Revenue

17 Min Read
Computing

Rustls Server-Side Performance Looking Very Good Compared To OpenSSL

1 Min Read
Computing

CATL seeks to manufacture batteries in the US pending Trump’s approval · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?