Who Is APT32?
A Timeline of High-Profile Apt32 Activity
2014: Begins cyber campaigns targeting a Vietnamese security firm, foreign companies in Vietnam, and Vietnamese ex-pats
2016: Targets Filipino technology firms and a Chinese hospitality developer in Vietnam
2017: Targets Vietnamese citizens in Australia, the Filipino government, a local Vietnamese security firm, and a German corporation operating in Vietnam legally
2018–2020: Targets Vietnamese human rights activists, both local and abroad
2020: APT32 operations linked to a Vietnamese company named CyberOne Group
How APT32 Attacks Work
Common APT32 Tactics, Techniques, and Procedures (TT&P)
- Hacking adversaries' websites to collect information and track their user base
- Custom macOS malware that utilizes the double extension technique or malicious Office macros written in the Perl programming language
- Using Facebook social networking to spread malware via social engineering attacks
- Using the legitimate penetration testing tool Cobalt Strike as command and control (C2) spyware
Malware Strains Exclusive to or Closely Associated with APT32
METALJACK: a relatively new first-stage malware exclusive to APT32 first used in 2020 capable of starting the infection chain and loading second-stage malware
Denis (aka DenisRAT): first discovered in 2017, Denis can capture keystrokes, steal login credentials, take screenshots, steal sensitive information, download additional malware, and move laterally to infect other systems
Kerrdown: exclusive to APT32 and in use since 2018, Kerrdown is a downloader malware module used to install spyware
Windshield: a simple TCP-based backdoor remote access trojan (RAT) that interacts with the victim host's file system and exfiltrates system information, and stops host system processes
Komprogo: a backdoor RAT exclusive to APT32 that supports remote command execution, exfiltration of host system information, and executing Windows Management Instrumentation (WMI) queries
Soundbite: a full-featured RAT exclusively used by APT32 that can upload files and execute commands on infected hosts using DNS protocol for C2 operations