Thursday, May 15, 2025
Advertisements

Earth Ammit Hackers Launch Advanced Attacks on Military Drone Supply Chains

by Charline

Security experts have linked Earth Ammit to Chinese-speaking advanced persistent threat (APT) groups. Between 2023 and 2024, the group carried out two major campaigns, showing new tactics and tools that pose serious risks to military and aerospace industries.

Two Campaigns: VENOM and TIDRONE

The first wave, called VENOM, focused on breaching software service providers and technology companies. Attackers exploited web server vulnerabilities to upload web shells. They used open-source tools to stay hidden and maintain access without revealing their identity.

Advertisements

The second wave, named TIDRONE, targeted military-related companies through the upstream supply chain. Victims were mainly from Taiwan and South Korea. Sectors affected include military, satellite, heavy industry, media, technology, software services, and healthcare.

Advertisements

By attacking supply chains, Earth Ammit aimed to reach downstream customers. This method allowed them to extend their attacks to high-value military assets, including drones used in defense.

Advertisements

Attack Techniques and Goals

Researchers at Trend Micro found that Earth Ammit uses two main attack methods:

Advertisements
  • Classic supply chain attacks, where malicious code is injected into trusted software.
  • General supply chain attacks, where malware is delivered via trusted communication channels without altering software files.

The group’s long-term goal appears to be infiltrating secure networks to access sensitive military technology, especially drone systems used in military operations.

Organizations hit by these attacks face risks such as stolen credentials, data leaks, and ongoing unauthorized access.

Rapid Evolution of Malware Tools

Earth Ammit’s malware has advanced quickly. Their latest backdoor, CLNTEND, introduced in 2024, shows major improvements over its earlier version, CXCLNT.

Both backdoors run in memory to avoid detection. However, CLNTEND operates as a DLL and supports seven communication protocols, while CXCLNT supports only two.

CLNTEND also uses fiber-based evasion techniques. These techniques rely on Windows fiber APIs to hide malicious activities from security software. Functions like ConvertThreadToFiber and CreateFiber make the malware harder to detect.

The following code snippet shows how the malware uses fibers to evade detection:

hModule = hinstDLL;
ModuleHandleA = GetModuleHandleA(0);
dword_10013300 = *(_DWORD *)((char *)ModuleHandleA + *((_DWORD *)ModuleHandleA + 15) + 40);
lpFiber = ConvertThreadToFiber(0);
Fiber = (char *)CreateFiber(0, (LPFIBER_START_ROUTINE)StartAddress, 0);
dword_100132C4 = (int)Fiber;
*(_DWORD *)&Fiber[(dword_10013300 ^ 0x10EC) + 196] = (char *)sub_10001480 + (dword_10013300 ^ 0x10EC);
SwitchToFiber(Fiber);

Earth Ammit also uses anti-analysis methods. These include verifying entry points with XOR checks and setting execution orders that block analysis tools.

In addition, the group uses a screen capture tool called SCREENCAP. This tool is based on open-source code and is used to spy on victims by capturing screenshots and sending them to command and control servers.

Attribution and Defense Measures

File timestamps and command logs suggest the attackers operate in the GMT+8 time zone. Their methods are similar to those used by the Dalbit threat group, which was previously reported by AhnLab.

To defend against such attacks, organizations should:

  • Implement third-party risk management programs.
  • Monitor for unusual use of fiber-related APIs.
  • Strengthen Endpoint Detection and Response (EDR) solutions.
  • Adopt a Zero Trust Architecture to verify every connection.

Earth Ammit’s activities highlight the growing threat to drone systems and other military technologies through supply chain attacks. Security experts urge organizations in the defense sector to remain vigilant and improve their cybersecurity measures.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com