Earth Lusca is a suspected China-based cyber espionage group that has been active since at least April 2019. Earth Lusca has targeted organizations in Australia, China, Hong Kong, Mongolia, Nepal, the Philippines, Taiwan, Thailand, Vietnam, the United Arab Emirates, Nigeria, Germany, France, and the United States. Targets included government institutions, news media outlets, gambling companies, educational institutions, COVID-19 research organizations, telecommunications companies, religious movements banned in China, and cryptocurrency trading platforms; security researchers assess some Earth Lusca operations may be financially motivated.[1]
Earth Lusca has used malware commonly used by other Chinese threat groups, including APT41 and the Winnti Group cluster, however security researchers assess Earth Lusca's techniques and infrastructure are separate.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Earth Lusca used a VBA script to execute WMI.[1] |
|
| Enterprise | T1595 | .002 | 主动扫描: Vulnerability Scanning |
Earth Lusca has scanned for vulnerabilities in the public-facing servers of their targets.[1] |
| Enterprise | T1090 | 代理 |
Earth Lusca adopted Cloudflare as a proxy for compromised servers.[1] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
Earth Lusca used the command |
| Enterprise | T1112 | 修改注册表 |
Earth Lusca modified the registry using the command |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Earth Lusca created a service using the command |
| Enterprise | T1190 | 利用公开应用程序漏洞 |
Earth Lusca has compromised victims by directly exploiting vulnerabilities of public-facing servers, including those associated with Microsoft Exchange and Oracle GlassFish.[1] |
|
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
Earth Lusca has placed a malicious payload in |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Earth Lusca has used certutil to decode a string into a cabinet file.[1] |
|
| Enterprise | T1547 | .012 | 启动或登录自动启动执行: Print Processors |
Earth Lusca has added the Registry key |
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Earth Lusca has used PowerShell to execute commands.[1] |
| .005 | 命令与脚本解释器: Visual Basic |
Earth Lusca used VBA scripts.[1] |
||
| .006 | 命令与脚本解释器: Python |
Earth Lusca used Python scripts for port scanning or building reverse shells.[1] |
||
| .007 | 命令与脚本解释器: JavaScript |
Earth Lusca has manipulated legitimate websites to inject malicious JavaScript code as part of their watering hole operations.[1] |
||
| Enterprise | T1482 | 域信任发现 |
Earth Lusca has used Nltest to obtain information about domain controllers.[1] |
|
| Enterprise | T1584 | .004 | 基础设施妥协: Server |
Earth Lusca has used compromised web servers as part of their operational infrastructure.[1] |
| .006 | 基础设施妥协: Web Services |
Earth Lusca has compromised Google Drive repositories.[1] |
||
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Earth Lusca has used WinRAR to compress stolen files into an archive prior to exfiltration.[1] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Earth Lusca has used ProcDump to obtain the hashes of credentials by dumping the memory of the LSASS process.[1] |
| .006 | 操作系统凭证转储: DCSync |
Earth Lusca has used a |
||
| Enterprise | T1608 | .001 | 暂存能力: Upload Malware |
Earth Lusca has staged malware and malicious files on compromised web servers, GitHub, and Google Drive.[1] |
| Enterprise | T1189 | 浏览器攻击 |
Earth Lusca has performed watering hole attacks.[1] |
|
| Enterprise | T1027 | 混淆文件或信息 |
Earth Lusca used Base64 to encode strings.[1] |
|
| .003 | Steganography |
Earth Lusca has used steganography to hide shellcode in a BMP image file.[1] |
||
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control |
Earth Lusca has used the Fodhelper UAC bypass technique to gain elevated privileges.[1] |
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Earth Lusca has sent spearphishing emails that required the user to click on a malicious link and subsequently open a decoy document with a malicious loader.[1] |
| .002 | 用户执行: Malicious File |
Earth Lusca required users to click on a malicious file for the loader to activate.[1] |
||
| Enterprise | T1218 | .005 | 系统二进制代理执行: Mshta |
Earth Lusca has used |
| Enterprise | T1033 | 系统所有者/用户发现 |
Earth Lusca collected information on user accounts via the |
|
| Enterprise | T1007 | 系统服务发现 |
Earth Lusca has used Tasklist to obtain information from a compromised host.[1] |
|
| Enterprise | T1049 | 系统网络连接发现 |
Earth Lusca employed a PowerShell script called RDPConnectionParser to read and filter the Windows event log "Microsoft-Windows-TerminalServices-RDPClient/Operational"(Event ID 1024) to obtain network information from RDP connections. Earth Lusca has also used netstat from a compromised system to obtain network connection information.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Earth Lusca used the command |
|
| Enterprise | T1583 | .001 | 获取基础设施: Domains |
Earth Lusca has registered domains, intended to look like legitimate target domains, that have been used in watering hole attacks.[1] |
| .004 | 获取基础设施: Server |
Earth Lusca has acquired multiple servers for some of their operations, using each server for a different role.[1] |
||
| .006 | 获取基础设施: Web Services |
Earth Lusca has established GitHub accounts to host their malware.[1] |
||
| Enterprise | T1588 | .001 | 获取能力: Malware |
Earth Lusca has acquired and used a variety of malware, including Cobalt Strike.[1] |
| .002 | 获取能力: Tool |
Earth Lusca has acquired and used a variety of open source tools.[1] |
||
| Enterprise | T1098 | .004 | 账号操控: SSH Authorized Keys |
Earth Lusca has dropped an SSH-authorized key in the |
| Enterprise | T1057 | 进程发现 |
Earth Lusca has used Tasklist to obtain information from a compromised host.[1] |
|
| Enterprise | T1210 | 远程服务漏洞利用 |
Earth Lusca has used Mimikatz to exploit a domain controller via the ZeroLogon exploit (CVE-2020-1472).[1] |
|
| Enterprise | T1018 | 远程系统发现 |
Earth Lusca used the command |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
Earth Lusca has used the megacmd tool to upload stolen files from a victim network to MEGA.[1] |
| Enterprise | T1566 | .002 | 钓鱼: Spearphishing Link |
Earth Lusca has sent spearphishing emails to potential targets that contained a malicious link.[1] |
| Enterprise | T1053 | 预定任务/作业 |
Earth Lusca used the command |
|