China’s APT40 targets new vulnerabilities and can abuse them within hours


Chinese state-sponsored threat actors, tracked by Western cybersecurity agencies as APT40, work fast. They hunt for previously undisclosed vulnerabilities, quickly build exploits, and rush to deploy them as soon as possible.
In some instances, the entire process, from vulnerability discovery to exploitation, only lasted a couple of hours.
This is according to a new security advisory, jointly published by national security agencies from Australia, the US, Canada, New Zealand, Japan, South Korea, the UK, and Germany.
Targeting SOHO gear
Two years ago, Australia’s Cyber Security Centre (ASCS) was called by a local business to assist with a cyberattack. With the victim’s permission, the agency “deployed host-based sensors to likely affected hosts on the organization’s network,” in order to track the attacker’s operations and map out its activities.
The advisory came as the result of that analysis, and states that APT40 “possesses the capability to rapidly transform and adapt exploit proof-of-concept(s) (POCs) of new vulnerabilities and immediately utilize them against target networks possessing the infrastructure of the associated vulnerability.”
Besides hunting for new flaws, the group also scans the internet for known vulnerabilities which haven’t been patched and as such present an easy gateway into the target infrastructure.
“This regular reconnaissance postures the group to identify vulnerable, end-of-life or no longer maintained devices on networks of interest, and to rapidly deploy exploits,” the agencies said. They are scanning for devices still vulnerable to Log4shell, Atlassian Confluence flaws, as well as known Microsoft Exchange vulnerabilities.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
“APT40 has embraced the global trend of using compromised devices, including small-office/home-office (SOHO) devices, as operational infrastructure and last-hop redirectors for its operations in Australia,” the researchers added. “Many of these SOHO devices are end-of-life or unpatched and offer a soft target for N-day exploitation.”
Targeting SOHO devices is a double-edged sword, though, as it also allows security agencies to track and analyze the attackers, and thus assist in setting up defenses.
Via TheRegister
More from TechRadar Pro
Chinese state-sponsored threat actors, tracked by Western cybersecurity agencies as APT40, work fast. They hunt for previously undisclosed vulnerabilities, quickly build exploits, and rush to deploy them as soon as possible. In some instances, the entire process, from vulnerability discovery to exploitation, only lasted a couple of hours. This is…
Recent Posts
- Mozilla is already revising its new Firefox terms to clarify how it handles user data
- How to watch Brit Awards 2025 online from anywhere and for free
- Google’s co-founder tells AI staff to stop ‘building nanny products’
- Around $40 billion worth of illicit crypto transactions took place in 2024
- Zapier says someone broke into its code repositories and may have accessed customer data
Archives
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010