Security News > 2020 > September > China-based APT Debuts Sepulcher Malware in Spear-Phishing Attacks

Researchers discovered the new malware being distributed over the past six months through two separate campaigns.
"Based on the use of publicly known sender addresses associated with Tibetan dissident targeting and the delivery of Sepulcher malware payloads, [we] have attributed both campaigns to the APT actor TA413," said Proofpoint researchers in a Wednesday analysis.
The second phishing campaign, starting at the end of July, targeted Tibetan dissidents with the same strain of Sepulcher malware.
Chinese APT TA413 is previously known for targeting Tibetan dissidents, as it did in its July campaign, so the March attack shows the skyrocketing trend of Chinese APTs branching out and adopting COVID-19 lures in espionage campaigns during the first half of 2020.
"The usage of publicly known Tibetan-themed sender accounts to deliver Sepulcher malware demonstrates a short-term realignment of TA413's targets of interest," said researchers.
News URL
https://threatpost.com/chinese-apt-sepulcher-malware-phishing-attacks/158871/
Related news
- Chinese FamousSparrow hackers deploy upgraded malware in attacks (source)
- Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks (source)
- Open-source malware doubles, data exfiltration attacks dominate (source)
- Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware (source)
- CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks (source)
- New TCESB Malware Found in Active Attacks Exploiting ESET Security Scanner (source)
- Infosec experts fear China could retaliate against tariffs with a Typhoon attack (source)
- iOS devices face twice the phishing attacks of Android (source)
- China names alleged US snoops over Asian Winter Games attacks (source)
- Midnight Blizzard deploys new GrapeLoader malware in embassy phishing (source)