New Threat Actor Targets APAC Organizations Using SQL Injection Attacks

A new and concerning threat actor has recently emerged, utilizing SQL injection attacks to gain unauthorized access to organizations operating in the APAC region. This article aims to provide a comprehensive overview of their activities, including the targeted websites, successful infiltrations, tools employed, language-based commands, remote file loading techniques, hosting with Supershell, modifications with Cobalt Strike, IP addresses used, and the availability of a detailed report on the threat actor’s activities.

Targeted Websites

The threat actor has brazenly targeted more than 20 websites across various sectors, encompassing government, gambling, retail, and travel sites. These attacks have reverberated across an array of countries, including Australia, China, Indonesia, the Philippines, India, South Korea, Thailand, and Brazil. This wide scope underscores the threat actor’s determination.

Successful Infiltration

Among the targeted websites, six organizations fell victim to the threat actor’s legacy SQL injection attacks, further highlighting the severity of this incursion. Their successful infiltration demonstrates the sophistication and persistence of this threat actor, necessitating a robust response from affected organizations and cybersecurity authorities.

In their nefarious activities, the threat actor leveraged a range of tools to exploit vulnerabilities in the targeted website’s security systems. Notably, they employed dirsearch, sqlmap, tinyproxy, redis-rogue-getshell, and CobaltStrike. These tools served as indispensable components of their attack arsenal, enabling them to navigate and exploit the compromised systems.

An intriguing aspect of the threat actor’s tactics lies in their frequent utilization of language-based ‘export’ commands. Out of the 750 commands executed on each server, an astonishing 95 of these were comprised of ‘export’ commands. This suggests a specific modus operandi designed to optimize their infiltration techniques or indicates a unique approach tailored to specific vulnerabilities.

Remote File Loading

To facilitate their actions, the threat actor ingeniously employed a ‘wget’ command, allowing them to load files from remote sources. This technique not only masks their activities but also enables the introduction of malicious files, further exacerbating the threat posed to infiltrated organizations.

Hosting with Supershell

The remote server utilized by the threat actor was found to be hosted on Supershell, a Chinese-language framework equipped with a user interface specifically designed for creating and managing reverse shells. This discovery sheds light on the potential origins or affiliations of the threat actor, further enhancing the urgency to curtail their malicious activities.

Modifications with Cobalt Strike

Cobalt Strike, a popular and versatile penetration testing tool, was manipulated by the threat actors to suit their objectives. Several modifications were made to launch their profiles with the C2 domains. These adaptations showcase their technical proficiency and adaptability, requiring defenders to stay vigilant and remain updated.

IP addresses and Operator Panel Access

During the investigation, several IP addresses were identified, revealing the threat actor’s logins into the operator panel. These IP addresses present potential leads for authorities to investigate their origin or trace possible connections to other cybercriminal networks.

In recognition of the significant threat posed by this newly discovered threat actor, a detailed report has been published. This comprehensive document provides invaluable insights into the GambleForce threat actor, shedding light on their attack methods, command executions, utilization of the MITRE Framework, and a range of other pertinent details. Armed with this information, organizations and cybersecurity experts can fortify their defenses, identify potential vulnerabilities, and thwart future attacks orchestrated by the GambleForce threat actor.

In conclusion, the emergence of a new threat actor leveraging SQL injection attacks in the APAC region demands immediate attention. By comprehensively understanding their tactics, tools, and infiltration techniques, organizations can proactively shield themselves against this growing menace. Collaboration and information sharing are imperative in combating cyber threats, ensuring a safer digital landscape for all.

Explore more

Why Is Employee Engagement Declining in the Age of AI?

The rapid integration of sophisticated algorithms into the daily workflow of modern enterprises has created a profound psychological rift that leaves the vast majority of the global workforce feeling increasingly detached from their professional contributions. While organizations race to integrate the latest algorithms, a silent crisis is unfolding at the desk next to the server: four out of every five

Why Are Employee Engagement Budgets Often the First Cut?

The quiet rustle of a red pen moving across a spreadsheet often signals the end of a company’s ambitious cultural initiatives before they even have a chance to take root. When economic volatility forces a tightening of the belt, the annual budget review transforms into a high-stakes survival exercise where every line item is interrogated for its immediate contribution to

Golden Pond Wealth Management: Decades of Independent Advice

The journey toward financial security often begins on a quiet morning in a small town, far from the frantic energy and aggressive sales tactics commonly associated with global financial hubs. In 1995, a young advisor in Belgrade Lakes Village set out to prove that a boutique firm could provide world-class guidance without sacrificing its local identity or intellectual freedom. This

Can Physical AI Make Neuromeka the TSMC of Robotics?

Digital intelligence has long been confined to the glowing rectangles of our screens, yet the most significant leap in modern technology is occurring where silicon meets the tangible world. While the world mastered digital logic years ago, the true frontier now lies in machines that can navigate the messy, unpredictable nature of physical space. In South Korea, Neuromeka is bridging

How Is Robotics Transforming Aluminum Smelting Safety?

Inside the humming labyrinth of a modern potline, workers navigate an environment where electromagnetic forces are powerful enough to pull a wrench from a pocket and molten aluminum glows with the terrifying radiance of an artificial sun. The aluminum smelting floor remains one of the few places on Earth where industrial operations require routine proximity to 1,650-degree Fahrenheit molten metal