Aoqin Dragon Has the Hallmarks of Chinese Espionage

Threat actor Aoqin Dragon continues its stealthy eight-year espionage campaign with attacks on targets primarily located in southeast Asia and Australia.

The APT group typically targets government, education and telecommunications organizations, according to a blog post from researchers at SentinelLabs who uncovered the actor’s nefarious activities. These include dropping lures in the form of documents with pornographic themes to infect users. The group also uses USB shortcut techniques to spread malware and infect additional targets.

“The threat actor has a history of using document lures with pornographic themes to infect users and makes heavy use of USB shortcut techniques to spread the malware and infect additional targets,” SentinelLabs researchers wrote. “Attacks attributable to Aoqin Dragon typically drop one of two backdoors: Mongall and a modified version of the open source Heyoka project.”

On closer inspection, Aoqin Dragon campaigns demonstrated “a clear evolution in their infection chain and TTPs” that the researchers divided into three parts:

  • Using a document exploit and tricking the user into opening a weaponized Word document to install a backdoor.
  • Luring users into double-clicking a fake antivirus to execute malware in the victim’s host.
  • Forging a fake removable device to lure users into opening the wrong folder and installing the malware successfully on their system.

The findings underscored the weak spots in many security strategies. “The worst-kept secret that bad actors leverage is that any phishing or Trojan-based malware, regardless of delivery mechanism, still depends on the lack of encryption on the target system’s data,” said Scott Bledsoe, CEO at Theon Technology. “Even relying on current established encryption approaches leaves organizations vulnerable to algorithmic decryption and/or quantum computer-based decryption faster than may be expected.”

If there were any doubts that security teams should patch flaws, then consider that from 2012-2015, “Aoqin Dragon relied heavily on CVE-2012-0158 and CVE-2010-3333 to compromise their targets.”

Activity that used lure documents containing themes related to Malaysia Airlines Flight 370’s disappearance was documented in a 2014 FireEye blog. “Although those vulnerabilities are very old and were patched before being deployed by Aoqin Dragon, this kind of RTF-handling vulnerability decoy was very common in that period,” SentinelLabs researchers said.

Those decoy documents revealed what the researchers believed are three interesting points. “First, most decoy content is themed around targets who are interested in APAC political affairs. Second, the actors made use of lure documents themed to pornographic topics to entice the targets,” they said. “Third, in many cases, the documents are not specific to one country but rather the entirety of Southeast Asia.”

It wasn’t much of a stretch for researchers to float an attribution and motive. “The targeting of Aoqin Dragon closely aligns with the Chinese government’s political interests,” researchers said. “Considering this long-term effort and continuous targeted attacks for the past few years, we [believe] the threat actor’s motives are espionage-oriented.”

Identifying and tracking state and state-sponsored threat actors is “challenging,” said Mike Parkin, senior technical engineer at Vulcan Cyber, because “they often appear to be criminal threats, using the same tools and techniques and often going after the same targets.”

Therefore, “conclusively linking them to a given state often requires a deeper analysis and understanding of their motives,” Parkin said. “SentinelOne releasing the information now on an APT group that has apparently been active for almost a decade, and which doesn’t appear in other lists, shows how hard it can be to be certain when you’re identifying a new threat actor.”

But Aoqin Dragon is in keeping with China’s MO. “The Chinese government has always done remarkable work in highly-specific targeting designed to infect their espionage targets,” said John Bambenek, principal threat hunter at Netenrich. “They are spending real effort to do the research to make sure they can discreetly infect organizations and operate for extended periods of time without being discovered.”

Image: Dragons by Grant Scharoff

Avatar photo

Teri Robinson

From the time she was 10 years old and her father gave her an electric typewriter for Christmas, Teri Robinson knew she wanted to be a writer. What she didn’t know is how the path from graduate school at LSU, where she earned a Masters degree in Journalism, would lead her on a decades-long journey from her native Louisiana to Washington, D.C. and eventually to New York City where she established a thriving practice as a writer, editor, content specialist and consultant, covering cybersecurity, business and technology, finance, regulatory, policy and customer service, among other topics; contributed to a book on the first year of motherhood; penned award-winning screenplays; and filmed a series of short movies. Most recently, as the executive editor of SC Media, Teri helped transform a 30-year-old, well-respected brand into a digital powerhouse that delivers thought leadership, high-impact journalism and the most relevant, actionable information to an audience of cybersecurity professionals, policymakers and practitioners.

teri-robinson has 204 posts and counting.See all posts by teri-robinson