top of page

Winnti Group, Blackfly, Wicked Panda

Mitre

Alias

Winnti Group, Blackfly, Wicked Panda

Country

China

Sponsor

State-sponsored

Motivation

Information Theft And Espionage

First Seen

2010

Description

Winnti Group is a threat group with Chinese origins that has been active since at least 2010. The group has heavily targeted the gaming industry, but it has also expanded the scope of its targeting. Some reporting suggests a number of other groups, including {{APT 41}}, {{Axiom, Group 72}}, {{APT 17, Deputy Dog, Elderwood, Sneaky Panda}}, and {{Ke3chang, Vixen Panda, APT 15, GREF, Playful Dragon}}, are closely linked to or overlap with Winnti Group.

(Trend Micro) The group behind the Winnti malware (which we will call the Winnti group for brevity) sprung up as a band of traditional cyber crooks, comprising black hats whose technical skills were employed to perpetrate financial fraud. Based on the use of domain names they registered, the group started out in the business of fake/rogue anti-virus products in 2007. In 2009, the Winnti group shifted to targeting gaming companies in South Korea using a self-named data- and file-stealing malware.

The group, which was primarily motivated by profit, is noted for utilizing self-developed technically-proficient tools for their attacks. They once attacked a game server to illicitly farm in-game currency (�gaming gold�, which also has real-world value) and stole source codes of online game projects. The group also engaged in the theft of digital certificates which they then used to sign their malware to make them stealthier. The Winnti group diversified its targets to include enterprises such as those in pharmaceutics and telecommunications. The group has since earned infamy for being involved in malicious activities associated with targeted attacks, such as deploying spear-phishing campaigns and building a backdoor.

Targeted
Industries

Online Video Game Companies, Aviation, Defense, Education, Financial, Government, Healthcare, Pharmaceutical, Technology, Telecommunications

Targeted
Countries

Belarus, Brazil, China, Germany, India, Indonesia, Japan, Peru, Philippines, Russia, South Korea, Taiwan, Thailand, Usa, Vietnam

Tools

Cobalt Strike
Funnyswitch
Winnti

TTP

Nil

Operations
Performed

[2010] hbgary Investigated An Information Security Incident At An American Video Game Company.)

[2011] in The Autumn Of 2011, A Trojan Was Detected On A Huge Number Of Computers � All Of Them Linked By The Fact That They Were Used By Players Of A Popular Online Game. It Emerged That The Piece Of Malware Landed On Users� Computers As Part Of A Regular Update From The Game�s Official Update Server. Some Even Suspected That The Publisher Itself Was Spying On Players. However, It Later Became Clear That The Malicious Program Ended Up On The Users� Computers By Mistake: The Cybercriminals Were In Fact Targeting The Companies That Develop And Release Computer Games. (https://securelist.com/winnti-more-than-just-a-game/37029/)

[2011] for Example, By 2011, One Of Their Victims Was Gameforge, A Company That Offers So-called Freemium Games: While Playing The Games Is Free, It Is Possible To Buy Virtual Items/money With Real Money.the Winnti Hackers Were Able To Directly Access Gameforge�s Databases And Modify Accounts To Become �virtually� Richer. (https://media.cert.europa.eu/static/memo/2019/tlp-white-cert-eu-memo-190725-1.pdf)

[2014 Summer] the Winnti Hackers Broke Into Henkel�s Network In 2014. We Have Three Files Showing That This Happened. (https://web.br.de/interaktiv/winnti/english/)

[2014-08] this Time The Operators Put Such Tag In The Configuration And It Turned Out To Be The Name Of The Well-known Global Pharmaceutical Company Headquartered In Europe. (https://securelist.com/games-are-over/70991/)

[2015] the Hackers Behind Winnti Have Also Set Their Sights On Japan�s Biggest Chemical Company, Shin-etsu Chemical. We Have In Our Hands Several Varieties Of The 2015 Malware Which Was Most Likely Used For The Attack. (https://web.br.de/interaktiv/winnti/english/)

[2015-07] a Basf Spokeswoman Tells Us In An Email That In July 2015, Hackers Had Successfully Overcome �the First Levels� Of Defense. (https://web.br.de/interaktiv/winnti/english/)

[2015-10] breach Of A Vietnamese Gaming Company (https://blog.vsec.com.vn/apt/initial-winnti-analysis-against-vietnam-game-company.html (during The Investigation, A Linux Version Of Winnti Was Found. (https://medium.com/chronicle-blog/winnti-more-than-just-windows-and-gates-e4f03436031a)

[2016-02] breach Of German Steelmaker Thyssenkrupp (https://www.dw.com/en/thyssenkrupp-victim-of-cyber-attack/a-36695341)

[2016-06] according To Siemens, They Were Penetrated By The Hackers In June 2016. (https://web.br.de/interaktiv/winnti/english/)

[2016 Summer] in The Case Of Another Japanese Company, Sumitomo Electric, Winnti Apparently Penetrated Their Networks During The Summer Of 2016. (https://web.br.de/interaktiv/winnti/english/)

[2017-03] recently, The Winnti Group, A Threat Actor With A Past Of Traditional Cybercrime �particularly With Financial Fraud, Has Been Seen Abusing Github By Turning It Into A Conduit For The Command And Control (c&c) Communications Of Their Seemingly New Backdoor (detected By Trend Micro As Bkdr64_winnti.onm). (https://blog.trendmicro.com/trendlabs-security-intelligence/winnti-abuses-github/)

[2018-04] breach Of German Chemicals Giant Bayer (https://www.dw.com/en/bayer-points-finger-at-wicked-panda-in-cyberattack/a-48196004)

[2018-11] breach Of Swiss Drug Maker Roche (https://www.reuters.com/article/us-germany-cyber/basf-siemens-henkel-roche-target-of-cyber-attacks-iduskcn1uj147)

[2019 Early] covestro Is Regarded As Germany�s Most Successful Spin-off In The Recent Past. Up Until June 2019, They Had At Least Two Systems On Which The Winnti Malware Had Been Installed. (https://web.br.de/interaktiv/winnti/english/)

[2019 Early] another Manufacturer Of Adhesives, Bostik Of France, Was Infected With Winnti In Early 2019. (https://web.br.de/interaktiv/winnti/english/)

[2019] lion Air, Marriott And Valve Declined To Comment Or Were Not Immediately Available For Comment (https://www.reuters.com/article/us-germany-cyber/basf-siemens-henkel-roche-target-of-cyber-attacks-iduskcn1uj147)

[2019 Late] breach Of German Chemicals Company Lanxess (https://www.tagesschau.de/investigativ/ndr/hackerangriff-chemieunternehmen-101.html)

[2020-02] based On Previous Knowledge And Targeting Of The Winnti Group, We Assess That This Sample Was Likely Used To Target Gravity Co., Ltd., A South Korean Video Game Company. The Company Is Known For Its Massive Multiplayer Online Role Playing Game (mmorpg) Ragnarok Online, Which Is Also Offered As A Mobile Application. (https://quointelligence.eu/2020/04/winnti-group-insights-from-the-past/)

[2021-03] exchange Servers Under Siege From At Least 10 Apt Groups (https://www.welivesecurity.com/2021/03/10/exchange-servers-under-siege-10-apt-groups/

Counter
Operations

Nil

Information

bottom of page