Report: Chinese state-sponsored hacking group highly active

FILE - The flags of the U.S. and Chinese are displayed together on top of a trishaw in Beijing on Sept. 16, 2018. American cybersecurity firm says a Chinese hacking group that is likely state-sponsored and has been linked previously to attacks on U.S. state government computers is still 鈥渉ighly active鈥 and is focusing on a broad range of targets that may be of strategic interest to China鈥檚 government and security services.(AP Photo/Andy Wong, File)

BANGKOK (AP) 鈥 A Chinese hacking group that is likely state-sponsored and has been linked previously to attacks on U.S. state government computers is still 鈥渉ighly active鈥 and is focusing on a broad range of targets that may be of strategic interest to China's government and security services, a private American cybersecurity firm said in a new report Thursday.

The hacking group, which the report calls RedGolf, shares such close overlap with groups tracked by other security companies under the names APT41 and BARIUM that it is thought they are either the same or very closely affiliated, said Jon Condra, director of strategic and persistent threats for Insikt Group, the threat research division of Massachusetts-based cybersecurity company Recorded Future.

Following up on previous reports of APT41 and BARIUM activities and monitoring the targets that were attacked, Insikt Group said it had identified a cluster of domains and infrastructure 鈥渉ighly likely used across multiple campaigns by RedGolf鈥 over the past two years.

鈥淲e believe this activity is likely being conducted for intelligence purposes rather than financial gain due to the overlaps with previously reported cyberespionage campaigns,鈥 Condra said in an emailed response to questions from The Associated Press.

China鈥檚 Foreign Ministry denied the accusations, saying, 鈥淭his company has produced false information on so-called 鈥楥hinese hacker attacks鈥 more than once in the past. Their relevant actions are groundless accusations, far fetched, and lack professionalism.鈥

Chinese authorities have consistently denied any form of state-sponsored hacking, instead saying China itself is a major target of cyberattacks.

APT41 was implicated in a 2020 indictment that accused Chinese hackers of targeting more than 100 companies and institutions in the U.S. and abroad, including social media and video game companies, universities and telecommunications providers.

In its analysis, Insikt Group said it found evidence that RedGolf 鈥渞emains highly active鈥 in a wide range of countries and industries, 鈥渢argeting aviation, automotive, education, government, media, information technology and religious organizations.鈥

Insikt Group did not identify specific victims of RedGolf, but said it was able to track scanning and exploitation attempts targeting different sectors with a version of the KEYPLUG backdoor malware also used by APT41.

Insikt said it had identified several other malicious tools used by RedGolf in addition to KEYPLUG, 鈥渁ll of which are commonly used by many Chinese state-sponsored threat groups.鈥

In 2022, the cybersecurity firm Mandiant reported that APT41 for breaches of the networks of at least six U.S. state governments, also using KEYPLUG.

In that case, APT41 exploited a previously unknown vulnerability in an off-the-shelf commercial web application used by 18 states for animal health management, according to Mandiant, which is now owned by Google. It did not identify which states鈥 systems were compromised.

Mandiant called APT41 鈥渁 prolific cyber threat group that carries out Chinese state-sponsored espionage activity in addition to financially motivated activity potentially outside of state control.鈥

Cyber intelligence companies use different tracking methodologies and often name the threats they identify differently, but Condra said APT41, BARIUM and RedGolf 鈥渓ikely refer to the same set of threat actor or group(s)鈥 due to similarities in their online infrastructure, tactics, techniques and procedures.

鈥淩edGolf is a particularly prolific Chinese state-sponsored threat actor group that has likely been active for many years against a wide range of industries globally,鈥 he said.

鈥淭he group has shown the ability to rapidly weaponize newly reported vulnerabilities and has a history of developing and using a large range of custom malware families.鈥

Insikt Group concluded that the use of KEYPLUG malware through certain types of command and control servers by RedGolf and similar groups is 鈥渉ighly likely to continue鈥 and recommended that clients ensure they are blocked as soon as they are detected.

The 好色tv Press. All rights reserved.

More Science Stories

Sign Up to Newsletters

Get the latest from 好色tvNews in your inbox. Select the emails you're interested in below.