TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
Symantec reveals Chinabacked Witchetty hacker group targeting Africa and the Middle East: How?

Symantec reveals Chinabacked Witchetty hacker group targeting Africa and the Middle East: How?

The group employs a steganographic technique to conceal a backdoor under the Microsoft Windows logo

Kaan K.byKaan K.
3 October 2022
in Security
Reading Time: 3 mins read
Share on FacebookShare on Twitter

The threat hunter team at Broadcom’s Symantec has published an alert showing that Chinabacked Witchetty and LookingFrog hacker groups are employing enhanced toolsets to target entities in Africa and the Middle East.

ESET found the organization for the first time in April 2022. Its operations are distinguished by using a first-stage backdoor (X4) and a second-stage payload (LookBack).

Chinabacked Witchetty attack tactics revealed in Symantec Advisory

According to Symantec’s analysis, Witchetty is linked to the Chinese APT organization Cicada, also known as Stone Panda, and APT10, as well as TA410. This organization has already been linked to targeted assaults on US energy companies.

The group’s toolkit is constantly developing. It presently employs a steganographic technique to conceal a backdoor (Backdoor.Stegmap) under the Microsoft Windows logo and targets Middle Eastern countries.

Symantec reveals Chinabacked Witchetty hacker group targeting Africa and the Middle East
Symantec reveals Chinabacked Witchetty hacker group targeting Africa and the Middle East

Although not novel, this is an unusual approach in which a virus is concealed within a picture. The virus may remove and create folders, manipulate files, launch/terminate processes, run/download executables, enumerate and kill processes, and steal data, among other things. It also has the ability to create, read, and remove registry keys.

Cicada was targeting Japanese organizations earlier this year, but it now appears to have expanded its target list to include North America, Asia, and Europe.

“A DLL loader downloads a bitmap file from a GitHub repository. The file appears to be simply an old Microsoft Windows logo. However, the payload is hidden within the file and is decrypted with an XOR key.” reads the analysis published by Broadcom’s Symantec Threat Hunter researchers. “Disguising the payload in this fashion allowed the attackers to host it on a free, trusted service.

Witchetty has demonstrated the ability to continually refine and refresh its toolset in order to compromise targets of interest. Exploitation of vulnerabilities on public-facing servers provides it with a route into organizations, while custom tools paired with adept use of living-off-the-land tactics allow it to maintain a long-term, persistent presence in targeted organizations.”

-Symantec

Specifics of the Attack

The infection chain includes the use of a DLL loader to get the GitHub bitmap file, which is a Microsoft Windows logo with malicious code embedded inside. This method of concealing the payload enables attackers to host it on trustworthy, free services such as GitHub.

Between February and September 2022, Witchetty attacked the administrations of two Middle Eastern countries, as well as the stock exchange of an African country. The group took use of the ProxyShell and ProxyLogon vulnerabilities, which were identified as CVE-2021-31207, CVE-2021-34473, CVE-2021-34523, CVE-2021-26855 and CVE-2021-27065.

Symantec reveals Chinabacked Witchetty hacker group targeting Africa and the Middle East
Symantec reveals Chinabacked Witchetty hacker group targeting Africa and the Middle East

According to Broadcom’s blog post, attackers install web shells on publicly accessible computers before obtaining credentials and gaining lateral network movement.

They also placed malware on computers in an attempt to steal passwords using memory dumps, the deployment of web shells and backdoors, command execution, backdoor deployment, and the installation of bespoke tools. This strategy allows it to infiltrate organizational networks, and the combination of tailored tools with other living-off-the-land strategies allows it to sustain long-term persistence in targeted organizations.

“Witchetty has demonstrated the ability to continually refine and refresh its toolset in order to compromise targets of interest,” Symantec says.

If you enjoyed this content be sure to check out our Edgy hacker hacks Fast Company, Zoom Mac Vulnerability and Microsoft Word allowing a backdoor for hackers articles.

What is Symantec?

The American software corporation NortonLifeLock Inc., formerly Symantec Corporation, has its headquarters in Tempe, Arizona. The business offers services and software for cybersecurity. The Fortune 500 firm NortonLifeLock is a component of the S&P 500 stock market index.

 

Tags: ChinesefeaturedhackerWindows
ShareTweet
Kaan K.

Kaan K.

Related Posts

Anna’s Archive leaks 300TB of Spotify’s music catalog

Anna’s Archive leaks 300TB of Spotify’s music catalog

22 December 2025
EU regulators accuse TikTok of ongoing data transfers to China

EU regulators accuse TikTok of ongoing data transfers to China

22 December 2025
Cisco announces hackers exploiting AsyncOS zero-day

Cisco announces hackers exploiting AsyncOS zero-day

19 December 2025
Koi uncovers data harvesting in Urban VPN Proxy

Koi uncovers data harvesting in Urban VPN Proxy

19 December 2025

LATEST

How to install mods and custom content in The Sims 2

Running Python files and fixing path errors on Windows

How to boot your PC into Command Prompt for troubleshooting

How to delete a virus using Command Prompt

How to connect a PS4 controller to Steam via USB or Bluetooth

How to connect your phone to Wi-Fi and fix connection issues

Apple begins iPhone 18 series production testing in January

EA investigates AI claims in Battlefield 6 cosmetics

Amazon Alexa+ will book your hotels and salons starting in 2026

OpenAI launches Skills in Codex

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska