25.1 C
New York
Saturday, March 29, 2025

Lotus Blossom Hacker Group Makes use of Dropbox, Twitter, and Zimbra for C2 Communications


The Lotus Blossom hacker group, also called Spring Dragon, Billbug, or Thrip, has been recognized leveraging reliable cloud providers like Dropbox, Twitter, and Zimbra for command-and-control (C2) communications of their cyber espionage campaigns.

Cisco Talos researchers attribute these refined operations to the group with excessive confidence, citing using a customized backdoor household referred to as Sagerunex.

Lively since at the least 2012, Lotus Blossom continues to focus on sectors akin to authorities, manufacturing, telecommunications, and media throughout areas together with the Philippines, Vietnam, Hong Kong, and Taiwan.

Lotus Blossom Lotus Blossom
Assault Chain

Multi-Variant Malware and Evasion Techniques

The Sagerunex backdoor has developed into a number of variants designed to evade detection and preserve persistence in compromised environments.

Earlier variations relied on conventional Digital Personal Servers (VPS) for C2 operations. Nevertheless, current campaigns exhibit a shift towards third-party cloud providers.

By using Dropbox APIs, Twitter tokens, and Zimbra webmail APIs as C2 tunnels, the group successfully blends malicious visitors with reliable service utilization, complicating detection efforts.

For instance:

  • Dropbox and Twitter Variants: These variants use APIs to ascertain C2 channels. After preliminary checks, they retrieve tokens to speak with the C2 infrastructure. Collected information is encrypted and uploaded to Dropbox or transmitted through Twitter standing updates.
  • Zimbra Variant: This model leverages Zimbra’s webmail service for each information exfiltration and command execution. Host data is encrypted into recordsdata connected to draft emails in compromised accounts.

These strategies spotlight the group’s adaptability in exploiting broadly used platforms to bypass conventional safety mechanisms.

Persistence and Reconnaissance

Lotus Blossom employs superior strategies to take care of long-term entry inside focused networks.

The Sagerunex backdoor is injected instantly into reminiscence and configured to run as a service via system registry modifications.

Lotus Blossom Lotus Blossom
Modify privilege device

Instructions akin to “netstat,” “ipconfig,” and “tasklist” are executed for reconnaissance, gathering detailed details about consumer accounts, processes, and community configurations.

Moreover, the group makes use of instruments like:

  • Chrome Cookie Stealers: To reap browser credentials.
  • Venom Proxy Instruments: Personalized for relaying connections.
  • Archiving Instruments: For compressing and encrypting stolen recordsdata.
  • Port Relay Instruments: To facilitate exterior communication from remoted programs.

These ways allow the group to function undetected for prolonged durations whereas conducting espionage actions.

Cisco Talos’ evaluation hyperlinks these campaigns to Lotus Blossom primarily based on constant ways, strategies, and procedures (TTPs), in addition to sufferer profiles.

The Sagerunex backdoor household stays central to their operations. Regardless of creating distinct variants over time, core functionalities akin to time-check logic for execution delays stay constant throughout all variations.

Using reliable cloud providers for malicious functions underscores the challenges organizations face in distinguishing between benign and dangerous exercise.

This growth requires enhanced monitoring of cloud-based visitors and sturdy endpoint safety options to mitigate dangers posed by superior persistent threats like Lotus Blossom.

Gather Menace Intelligence on the Newest Malware and Phishing Assaults with ANY.RUN TI Lookup -> Attempt at no cost

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles