HomeTechnologyCybersecurityGhostEmperor Resurfaces: Chinese Hacking Group Spotted After Two Years

GhostEmperor Resurfaces: Chinese Hacking Group Spotted After Two Years

Published on

spot_img

A previously elusive Chinese hacking group known as GhostEmperor has resurfaced after more than two years of silence. This group is infamous for its sophisticated supply-chain attacks targeting telecommunications and government sectors in Southeast Asia. Cybersecurity firm Sygnia reported that GhostEmperor was involved in a recent incident where it compromised a client’s network to access another victim’s systems.

This marks the first update on GhostEmperor since Kaspersky Lab identified the group in 2021. Amir Sadon, Sygnia’s director of incident response research, expressed uncertainty about the lack of public reports regarding the group’s activities during the past two years, suggesting that the gap could stem from either reduced activity or diminished visibility.

GhostEmperor is known for utilizing a complex hacking tool called a kernel-level rootkit, typically associated with state-sponsored hacking due to the extensive resources required for its development. This rootkit grants the group access to the core of the operating system, enabling it to evade detection by common security measures like endpoint detection and response (EDR) tools.

Sygnia’s findings indicate that the rootkit, named Demodex by Kaspersky, has evolved, showcasing a more intricate infection process that highlights the group’s enhanced stealth and sophistication. Kaspersky’s earlier reports noted GhostEmperor’s targeting of high-profile entities across Southeast Asia and other regions, suggesting that the group may exploit connections to spy on geopolitically significant activities.

The supply-chain implications of the recent attack are particularly concerning, as the group used its foothold in one network to infiltrate the networks of the client’s business partners. Sygnia’s managing director, Azeem Aleem, emphasized the need for organizations to understand their environments better to minimize exposure to breaches, acknowledging that while complete security is unattainable, proactive strategies can help reduce the duration of adversarial access.

Latest articles

Malaysia’s Death Penalty and Section 302: A Transformative Era

Malaysia's death penalty laws, particularly Section 302 which mandates capital punishment for murder, have...

Fraudulent CrowdStrike Manual Distributes New Infostealer Malware

CrowdStrike has issued a warning regarding a fraudulent recovery manual designed to repair Windows...

Special Flight Launched To Repatriate Malaysians From Bangladesh

The AirAsia flight AK77, deployed to evacuate Malaysians from Bangladesh, safely landed at Hazrat...

Mysterious Chinese Hacking Group ‘Ghostemperor’ Resurfaces After Two Years

A secretive and highly elusive Chinese hacking group known as GhostEmperor, infamous for its...

More like this

Fraudulent CrowdStrike Manual Distributes New Infostealer Malware

CrowdStrike has issued a warning regarding a fraudulent recovery manual designed to repair Windows...

Von Der Leyen Vows To Combat Ransomware Attacks On EU Hospitals

Former European Commission President Ursula von der Leyen has committed to developing a strategy...

Eight Wartime Rules For “Civilian Hackers” And Four State Obligations To Restrain Them

As digital technology changes how militaries conduct war, a concerning trend has emerged in...