CPU

Hackers engaging in cyber espionage have targeted Chinese-speaking semiconductor companies with TSMC-themed lures that infect them with Cobalt Strike beacons.

Taiwan Semiconductor Manufacturing Company (TSMC) is the world's largest semiconductor contract manufacturing and design firm, with an annual revenue of $73.5 billion and over 73,000 employees worldwide.

The campaign spotted by EclecticIQ focuses on firms based in Taiwan, Hong Kong, and Singapore, with the observed TTPs (tactics, techniques, and procedures) bearing similarities to previous activities linked to Chinese state-backed threat groups.

Deploying Cobalt Strike

Eclectic's report does not specify the initial compromise channel, but it is presumed to be spear-phishing emails, a typical approach used in cyber espionage operations.

In this campaign, the threat actors distribute the HyperBro loader to install a Cobalt Strike beacon on the compromised device, providing remote access to the threat actors.

When HyperBro is launched, it will also display a PDF pretending to be from TSMC to divert attention, achieve a stealthier compromise, and avoid raising suspicions.

Decoy TSMC document
Decoy TSMC document (EclecticIQ)

The loader uses DLL side-loading to launch a Cobalt Strike beacon in memory, leveraging a digitally signed binary from CyberArk's vfhost.exe.

A file named 'bin.config' that contains XOR encrypted Cobalt Strike shellcode is decrypted and loaded into the legitimate 'vfhost.exe' process, evading AV detection.

The command and control (C2) server address hardcoded into the Cobalt Strike implant used in this attack is disguised as a legitimate jQuery CDN, allowing it to bypass firewall defenses.

C2 config retrieved from decoded Cobalt Strike
C2 config extracted from Cobalt Strike's shellcode (EclecticIQ)

On a second variant of the attack, the hackers use a compromised Cobra DocGuard web server to drop an additional McAfee binary ('mcods.exe') and load more Cobalt Strike shellcode using DLL side-loading again via 'mcvsocfg.dll.'

The two attack chains
The two attack chains (EclecticIQ)

In this case, the hackers deployed a previously undocumented Go-based backdoor named 'ChargeWeapon,' designed to gather and transmit host data to the C2 in base64-encoded form.

ChargeWeapon employs simple malware evasion methods provided through the "garble" open-source tool, while its capabilities include the following:

  • Communicate with a remote device using the default Windows command line interface
  • Execute commands through Windows Management Instrumentation (WMI)
  • Utilize TCP over HTTP for its C2 communications
  • Use base64 encoding to obfuscate data during C2 connection
  • Reads and writes files on the infected host

Attributed to China

Eclectic says the observed TTPs show extensive similarities with Chinese threat group's operations, like RedHotel and APT27 (aka Budworm, LuckyMouse).

"EclecticIQ analysts assess with high confidence that the analyzed Hyperbro Loader, the malware downloader and the GO backdoor are very likely operated and developed by a PRC backed nation-state threat actor, due to victimology, infrastructure observed, malware code and resemblance with previously reported activity clusters," explains EclecticIQ.

Symantec and ESET have both previously reported about China-sponsored APTs leveraging Cobra DocGuard servers for malware delivery, further strengthening the attribution hypothesis to Chinese hackers.

Related Articles:

North Korea hacks two South Korean chip firms to steal engineering data

Russian Sandworm hackers pose as hacktivists in water utility breaches

Russian hackers target German political parties with WineLoader malware

Researchers sinkhole PlugX malware server with 2.5 million unique IPs

ArcaneDoor hackers exploit Cisco zero-days to breach govt networks