The Gelsemium advanced persistent threat (APT) group, known for its stealthy cyber espionage activities, has recently intensified its operations against a Southeast Asian government. This campaign, spanning from 2022 to 2023, highlights the group’s ongoing commitment to sophisticated cyber attacks aimed at intelligence gathering.

Overview of the Gelsemium Campaign

The Gelsemium group, operational since 2014, has a track record of targeting various sectors, including government, education, and electronic manufacturers, primarily in East Asia and the Middle East. Their approach is characterized by sophisticated, stealthy attacks designed to extract sensitive information.

Technical Details of the Recent Campaign

A new campaign by Gelsemium was identified in a report by Palo Alto Network’s Unit 42. This operation began with the installation of web shells on targeted servers, likely exploiting vulnerabilities in internet-facing servers. The use of publicly available web shells like ‘reGeorg,’ ‘China Chopper,’ and ‘AspxSpy’ was noted, which complicates attribution due to their widespread availability.

Key aspects of the campaign include:

  • Network Reconnaissance and Lateral Movement: Gelsemium used these web shells for initial reconnaissance and lateral movement within the network, often employing the Server Message Block (SMB) protocol.
  • Additional Tools for Sophisticated Operations: The deployment of tools like OwlProxy, SessionManager, Cobalt Strike, SpoolFool, and EarthWorm facilitated lateral movement, data collection, and privilege escalation.
  • Custom Tools and Proxy Functionality: OwlProxy and SessionManager, custom tools in Gelsemium’s arsenal, indicate the group’s intention to use compromised servers as gateways for broader network infiltration.

Recommendations for Protection

To defend against such advanced threats, organizations should:

  1. Regularly Update Systems: Keep web server software, operating systems, and applications updated with the latest security patches.
  2. Implement Web Application Security Best Practices: Use input validation, output encoding, and parameterized queries to prevent common vulnerabilities like SQL injection and XSS.
  3. Secure File Uploads: If your application allows file uploads, validate file types and store them securely outside the web root.
  4. Deploy a Web Application Firewall (WAF): Use a WAF to filter and block malicious web traffic, including attempts to upload web shells.
  5. Disable Unnecessary Services: Remove or disable unused features, modules, scripts, and plugins on web servers.
  6. Configure Security Headers: Use headers like CSP, X-Content-Type-Options, X-Frame-Options, and HSTS to enhance browser security.
  7. Utilize Behavior-Based Detection Tools: Implement tools with behavior-based detection capabilities, such as Crowdstrike’s Falcon, for early detection and prevention of malware.

Conclusion

The Gelsemium APT group’s recent campaign underscores the necessity for robust cybersecurity measures and continuous monitoring to counter sophisticated adversaries. Their ability to adapt and persist even in the face of security challenges highlights the importance of a proactive defense strategy.

The persistence and adaptability of the Gelsemium APT group make them a formidable cyber threat, particularly for governments and key industries in Southeast Asia. Staying ahead of such threats requires not only advanced security measures but also a comprehensive understanding of the tactics and tools employed by these sophisticated actors.

Also Read:

Categorized in: