Inside Storm-0940: Uncovering Tactics of a Prolific Chinese Cyber Espionage Group


Posted on: 20 Nov 2024 | Author: Foresiet
header

Introduction to Storm-0940 APT

Storm-0940 is a Chinese advanced persistent threat (APT) group that has operated since at least 2021, although some evidence suggests involvement in earlier incidents. Known for its complex cyber espionage tactics, this group primarily targets government agencies, military organizations, and critical infrastructure to gain intelligence for political and military advantage.

Leveraging an arsenal of techniques ranging from spear-phishing to exploiting software vulnerabilities. Storm-0940 continues to challenge international security frameworks across North America, Europe, and Asia.

Key Characteristics of Storm-0940

Storm-0940 is an advanced threat actor group believed to be based in China, operating with tools and persistence. They employ stealthy, gradual methods, including low-frequency, high-efficiency credential-stealing techniques that evade many traditional cybersecurity defenses.

Microsoft has recently begun tracking this group under the temporary codename "Storm-0940" due to their high-impact activities. Though their full identity remains undetermined, their methods suggest expertise in evading standard monitoring systems, particularly through credential theft and password attacks

Known Attacks and Incidents

This group’s activities are linked to credential-stealing attacks, particularly targeting Microsoft accounts. Since August 2023, Microsoft has been monitoring this group’s advanced tactics, which have successfully compromised multiple high-profile accounts. One incident revealed that the group utilized a covert network of compromised routers to conduct large-scale attacks, evading conventional detection tools.

Their attacks often exploit outdated security measures in routers, making it challenging for standard enterprise defenses to detect and block malicious traffic. These incidents highlight the need for businesses to adopt advanced threat detection and network segmentation strategies to protect against similar threats.

Recent Activity: Focus on Password Spray Attacks

In recent months, Storm-0940 has increasingly used password spray attacks to compromise accounts at high-profile organizations. Unlike brute-force attacks, password spraying attempts fewer login attempts per account over an extended period, which often avoids triggering security alerts. Their attacks primarily target government agencies, think tanks, and corporations with valuable or sensitive data.

How Password Spray Attacks Work

Password spraying differs from traditional brute-force methods by focusing on a small number of login attempts per day, usually against many accounts. This approach exploits common passwords, counting on the probability that at least a few users in a large organization may use easy-to-guess passwords. Storm-0940’s password spray attacks are particularly concerning because they:

  • Conduct minimal daily login attempts per account, bypassing security systems designed to detect high-frequency login failures.
  • Use commonly available and affordable credential-stuffing tools, enhancing accessibility for these attacks.
  • Combine these attacks with reconnaissance and data collection to maintain persistent access within the network.

Mapping Storm-0940 TTPs to the MITRE ATT&CK Framework

The tactics, techniques, and procedures (TTPs) associated with Storm-0940 align closely with the MITRE ATT&CK Framework, providing a structured approach to understanding their cyber methods. Each TTP represents real-world techniques widely observed across cyber threat actors, underscoring the need for robust defenses. Here’s why they are credible and relevant:

MITRE ATT&CK Framework: This widely adopted tool catalogs known adversarial tactics and techniques based on real-world observations. It helps security teams understand and anticipate threat behaviors, making it invaluable for defending against groups like Storm-0940.

Relevant Techniques:

  • Password Spraying (T1110.003): Frequently used by attackers to target cloud services, this technique involves trying common passwords across multiple accounts to avoid detection and lockouts.
  • Valid Accounts for Access (T1078): Attackers often leverage stolen or compromised credentials for initial access, bypassing traditional security controls.
  • Encrypted C2 Channels (T1071.001): Threat actors commonly use encrypted communication channels with command and control (C2) servers to evade detection during operations.

These techniques aren’t speculative; they’re grounded in real adversarial behavior. Aligning them with MITRE ATT&CK helps illustrate the threat landscape and emphasizes the need for organizations to enhance detection and defense capabilities.

Past Attacks Mapped to MITRE

In 2023, Storm-0940’s most attack involved targeting corporate Microsoft accounts across multiple industries. Using password spray techniques across compromised routers, they obtained login credentials, granting them unauthorized access to confidential data.

Another significant attack focused on technology firms, where they bypassed security using compromised routers and effectively masked the origin of their attacks. This incident underscored their capability to operate covertly, using layers of obfuscation to evade traditional network-based security monitoring.

Effective Defense Strategies Against Storm-0940

To defend against such advanced groups, organizations should prioritize a multi-layered security strategy that enhances both preventative and detective controls. Implementing multi-factor authentication (MFA) is crucial, especially for high-value accounts, to counteract credential-based attacks like password spraying.

Strong password policies should also be enforced, with regular updates and discouragement of common or easily guessed passwords. Network segmentation can be beneficial in limiting lateral movement if a breach does occur, while continuous monitoring of router and network traffic for unusual activity such as connections to unauthorized Ips can help detect and prevent attacks originating from compromised devices

In addition, deploying endpoint detection and response (EDR) solutions helps monitor and mitigate suspicious activities, such as unusual PowerShell commands and system modifications, which are commonly used by Storm-0940 to impair defenses and evade detection.

A robust patch management routine is essential to secure routers and IoT devices, ensuring they are up-to-date and protected against exploitation. Integrating threat intelligence feeds is also highly effective, allowing security systems to proactively block known indicators of compromise (IOCs) associated with Storm-0940.

Finally, regular threat-hunting exercises should be conducted to detect any signs of intrusion early, helping to neutralize potential threats before they escalate into full-scale breaches.

Conclusion

Storm-0940’s use of covert networks and advanced credential-theft techniques underscores the importance of layered security. By leveraging a mix of brute force, evasion, and exploitation techniques, they continue to pose a growing threat to global organizations. Enhancing defenses through strong authentication, network segmentation, and vigilant monitoring is essential for mitigating the risks associated with Storm-0940 and similar APT groups.

For organizations, a proactive approach to security, incorporating both preventative and detective controls, remains the most effective defense against the sophisticated threats posed by this APT.


About us!

Foresiet is the pioneering force in digital security solutions, offering the first integrated Digital Risk Protection SaaS platform. With 24x7x365 dark web monitoring and proactive threat intelligence, Foresiet safeguards against data breaches and intellectual property theft. Our robust suite includes brand protection, takedown services, and supply chain assessment, enhancing your organization's defense mechanisms. Attack surface management is a key component of our approach, ensuring comprehensive protection across all vulnerable points. Compliance is assured through adherence to ISO27001, NIST, GDPR, PCI, SOX, HIPAA, SAMA, CITC, and Third Party regulations. Additionally, our advanced antiphishing shield provides unparalleled protection against malicious emails. Trust Foresiet to empower your organization to navigate the digital landscape securely and confidently.

Safeguard Your Reputation, Data, and Systems

Protect your brand, reputation, data, and systems with Foresiet's Integrated Digital Risk Platform. 24/7/365 threat monitoring for total peace of mind.

dashboard