HyperBro

Malware updated 4 months ago (2024-05-04T21:18:37.502Z)
Download STIX
Preview STIX
HyperBro is a malicious software (malware) that has been utilized in a sophisticated cyber espionage campaign targeting semiconductor industries primarily in Taiwan, Hong Kong, and Singapore. This malware was discovered being used in conjunction with a lure purporting to be from the Taiwan Semiconductor Manufacturing Company (TSMC). The scheme involves the HyperBro loader variant using a digitally signed CyberArk binary for a DLL-Side Loading attack, resulting in the in-memory execution of a Cobalt Strike beacon. The Cobalt Strike beacon was then installed on victims' computers using the HyperBro loader. This campaign has been attributed to China by Dutch cybersecurity firm EclecticIQ due to the use of the HyperBro loader, which is associated with a state-backed group labeled Budworm or APT27. The deployment of HyperBro was observed to occur through spear-phishing emails, which delivered the HyperBro loader that displayed a file purportedly from TSMC while deploying a Cobalt Strike beacon via DLL side-loading. In March, Advanced Persistent Threat (APT) actors installed HyperBro on the Exchange Server and two other systems. The entire scheme, including the legitimate component IntgStat.exe, pcalocalresloader.dll library, and the encrypted file thumb.db, was used solely to download the HyperBro backdoor. Notably, shikata_ga_nai obfuscation was not applied in the case of Able Desktop. EclecticIQ analysts have expressed high confidence that the analyzed HyperBro Loader, the malware downloader, and the GO backdoor are very likely operated and developed by a People's Republic of China (PRC) backed nation-state threat actor. This assessment is based on victimology, observed infrastructure, malware code, and resemblance with previously reported activity clusters. To protect against such vulnerabilities, it is recommended to use Patch Manager Plus to quickly patch over 850 third-party applications.
Description last updated: 2024-05-04T20:27:13.838Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Apt
Trojan
Backdoor
Webshell
Payload
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the HyperBro Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
a year ago
Chinese Hackers Attacking Semiconductor Industries using Cobalt Strike beacon
CERT-EU
a year ago
L’hebdo cybersécurité (8 octobre 2023) • Cybersécurité
CERT-EU
a year ago
China-based spies are hacking East Asian semiconductor companies, report says | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
a year ago
Semiconductor firms targeted by Chinese hackers
CERT-EU
a year ago
Cyber Security Week in Review: October 6, 2023
CERT-EU
a year ago
China-linked cyberspies backdoor semiconductor firms with Cobalt Strike
CERT-EU
a year ago
Chinese State-Sponsored Cyber Espionage Activity Targeting Semiconductor Industry in East Asia
MITRE
2 years ago
Iron Tiger APT Updates Toolkit With Evolved SysUpdate Malware
MITRE
2 years ago
Emissary Panda Attacks Middle East Government SharePoint Servers
MITRE
2 years ago
LuckyMouse hits national data center to organize country-level waterholing campaign
MITRE
2 years ago
Chinese Hackers Carried Out Country-Level Watering Hole Attack
CISA
2 years ago
Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization | CISA
CISA
2 years ago
MAR-10365227-2.v1 HyperBro | CISA
CISA
2 years ago
Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization | CISA
Trend Micro
2 years ago
Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting
CERT-EU
a year ago
Space Pirates: analyzing the tools and connections of a new hacker group