<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ethereal Panda — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/ethereal-panda/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/ethereal-panda/feed.xml" rel="self" type="application/rss+xml"/><item><title>Flax Typhoon Masquerading SoftEther VPN as Legitimate Windows Binaries</title><link>https://feed.craftedsignal.io/briefs/2024-01-flax-typhoon-softether/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-flax-typhoon-softether/</guid><description>The Flax Typhoon group uses SoftEther VPN, masquerading the VPN client as legitimate Windows binaries like conhost.exe and dllhost.exe, to obfuscate their network activity within compromised Taiwanese organizations.</description><content:encoded><![CDATA[<p>The Flax Typhoon group has been observed using SoftEther VPN software to hide their network activity after gaining access to Taiwanese organizations. This activity, observed as of August 2023, involves renaming the SoftEther VPN client executable to masquerade as legitimate Windows processes, specifically <code>conhost.exe</code> and <code>dllhost.exe</code>. By doing so, they attempt to blend in with normal system activity and evade detection. The group&rsquo;s activity highlights a trend of leveraging legitimate tools for malicious purposes. This allows them to maintain a low profile and persist within compromised networks for extended periods. Defenders should be aware of this tactic and implement detections to identify SoftEther VPN processes running under unexpected names.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a Taiwanese organization through unknown means.</li>
<li>Deployment of SoftEther VPN client onto the compromised system.</li>
<li>Renaming of the SoftEther VPN client executable to <code>conhost.exe</code> or <code>dllhost.exe</code>.</li>
<li>Execution of the renamed SoftEther VPN client to establish a VPN connection.</li>
<li>Network traffic is routed through the SoftEther VPN, masking the origin of malicious activity.</li>
<li>Lateral movement within the network using the VPN connection for obfuscation.</li>
<li>Data exfiltration or other malicious activities, further concealed by the VPN.</li>
<li>Maintaining persistence by ensuring the renamed VPN client automatically starts on system reboot, providing continuous obfuscation for their activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of this technique allows the Flax Typhoon group to operate within compromised networks with reduced visibility. By masquerading the VPN client as legitimate processes, they make it more difficult for defenders to identify and respond to malicious activity. This can lead to prolonged periods of undetected data theft, system compromise, and other harmful outcomes. While the exact number of victims is unknown, the targeting of Taiwanese organizations suggests a focused campaign with potentially significant impact on national security and economic interests.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect SoftEther VPN binaries running under the names <code>conhost.exe</code> or <code>dllhost.exe</code> in your SIEM (see rules).</li>
<li>Investigate any instances of <code>conhost.exe</code> or <code>dllhost.exe</code> processes with a company name containing &ldquo;SoftEther&rdquo; or an original filename matching &ldquo;vpnbridge*.exe&rdquo; (see rules).</li>
<li>Monitor process creation events (Event ID 1 in Sysmon) for unexpected executions of renamed binaries.</li>
<li>Review network connection logs for outbound traffic originating from <code>conhost.exe</code> or <code>dllhost.exe</code> to external VPN servers, potentially indicating masqueraded SoftEther VPN activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>flax-typhoon</category><category>defense-evasion</category><category>lateral-movement</category><category>vpn</category><category>process-masquerading</category></item></channel></rss>