Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Ransomware, Espionage, and the Blurring Lines of State-Sponsored Cybercrime


Chinese government-backed espionage groups are moonlighting as ransomware attackers, raising concerns about the blurring lines between state-sponsored cybercrime and traditional ransomware gangs. The recent attack by a Chinese government-backed espionage group is a stark reminder of the threats that we face in the digital age.

  • Cybersecurity experts warn of increasing threat of state-sponsored cybercrime, where rogue states use sophisticated hacking tools to steal info and disrupt critical infrastructure.
  • A Chinese government-backed espionage group is moonlighting as a ransomware attacker, raising concerns about blurring lines between state-sponsored cybercrime and traditional ransomware gangs.
  • The attackers used the same toolkit as traditional ransomware gangs, including a custom version of PlugX backdoor previously deployed by a Beijing-backed spying crew.
  • Experts question motivations behind the attack, with some suggesting that espionage actors may be looking for easy money or engaging in financially motivated attacks to subsidize their operations.
  • The blurring lines between nation-state cyber spies and financially motivated cybercriminals has significant implications for cybersecurity experts and policymakers, highlighting the need for greater cooperation and intelligence sharing.



  • Cybersecurity experts have long warned of the increasing threat of state-sponsored cybercrime, where rogue states and their agents use sophisticated hacking tools to steal sensitive information, disrupt critical infrastructure, and extort money from victims. The latest development in this area is a disturbing trend where some government-backed espionage groups are also moonlighting as ransomware attackers.

    The phenomenon was first observed by Symantec researchers, who noticed that an actor linked to espionage operations was also mounting a ransomware attack on a medium-sized software and services company in South Asia. The attackers compromised the company's network using a critical Palo Alto Networks authentication bypass flaw (CVE-2024-0012) and then swiped admin credentials from the company intranet. They used these credentials to access a Veeam server where they found AWS S3 credentials, which allowed them to grab sensitive information from the cloud storage account.

    But that was not all - the attackers also encrypted the company's Windows computers with RA World ransomware and demanded a $2 million ransom. This attack is significant because it appears that an actor linked to espionage operations was using the same toolkit as a traditional ransomware gang, which has raised eyebrows among cybersecurity experts.

    Symantec researchers observed that the attackers used a custom version of the PlugX backdoor previously deployed by a Beijing-backed spying crew known in the West as Fireant aka Mustang Panda aka Earth Preta. This is significant because PlugX is a classic Windows backdoor that allows attackers to connect to infected systems, steal data, and run code on them.

    The researchers noted that this was not an isolated incident, but rather part of a pattern where an actor linked to espionage operations was using the same toolkit as traditional ransomware gangs. This raises questions about the motivations of these actors and whether they are simply looking for easy money or if there is something more sinister at play.

    "Sometimes a job is just a job," said Symantec's researchers. "It is unclear why an actor who appears to be linked to espionage operations is also mounting a ransomware attack." However, this explanation may not hold water in light of the increasing crossover between criminal and state-sponsored cyber activity.

    Cybersecurity experts have long warned about the blurring lines between nation-state cyberspies and financially motivated cybercriminals. The latest development in this area is a disturbing trend where some government-backed espionage groups are also moonlighting as ransomware attackers.

    "This is not unusual for North Korean threat actors to engage in financially motivated attacks to subsidize their operations," said ESET senior malware researcher Jakub Souček. "However, there is no similar history for China-based espionage threat actors, and there is no obvious reason why they would pursue this strategy." However, the fact that a Chinese government-backed espionage group was using the same toolkit as traditional ransomware gangs raises questions about the sophistication and reach of these actors.

    The increasing crossover between criminal and state-sponsored cyber activity has significant implications for cybersecurity experts and policymakers. It highlights the need for more effective cooperation and intelligence sharing between countries to counter this threat.

    As one expert noted, "Crimelords and spies for rogue states are working together, says Google. Only lawmakers can stop them. Plus: software needs to be more secure, but what's in it for us?"

    The recent attack by a Chinese government-backed espionage group is a stark reminder of the threats that we face in the digital age. It highlights the need for greater cooperation and intelligence sharing between countries to counter this threat.

    In conclusion, the blurring lines between state-sponsored cybercrime and traditional ransomware gangs are a disturbing trend that requires immediate attention from cybersecurity experts and policymakers. The recent attack by a Chinese government-backed espionage group is a stark reminder of the threats that we face in the digital age, and highlights the need for greater cooperation and intelligence sharing to counter this threat.

    Chinese government-backed espionage groups are moonlighting as ransomware attackers, raising concerns about the blurring lines between state-sponsored cybercrime and traditional ransomware gangs. The recent attack by a Chinese government-backed espionage group is a stark reminder of the threats that we face in the digital age.



    Related Information:

  • https://go.theregister.com/feed/www.theregister.com/2025/02/14/chinese_spies_ransomware_moonlighting/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-0012

  • https://www.cvedetails.com/cve/CVE-2024-0012/


  • Published: Thu Feb 13 21:34:07 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us