DarkHotel
Description
(SecurityWeek) The activities of the DarkHotel advanced persistent threat (APT) actor came to light in November 2014, when Kaspersky published a report detailing a sophisticated cyberespionage campaign targeting business travelers in the Asia-Pacific region. The group has been around for nearly a decade and some researchers believe its members are Korean speakers.
The attackers targeted their victims using several methods, including through their hotel’s Wi-Fi, zero-day exploits and peer-to-peer (P2P) file sharing websites. Nearly one year later, the threat group was observed using new attack techniques and an exploit leaked from Italian spyware maker Hacking Team.
DarkHotel victims have been spotted in several countries, including North Korea, Russia, South Korea, Japan, Bangladesh, Thailand, Taiwan, China, the United States, India, Mozambique, Indonesia and Germany. Up until recently, the attacks appeared to focus on company executives, researchers and development personnel from sectors such as defense industrial base, military, energy, government, NGOs, electronics manufacturing, pharmaceutical, and medical.
In more recent DarkHotel attacks it has dubbed “Inexsmar,” security firm Bitdefender said the hackers targeted political figures, and they appeared to be using some new methods.
Names
Name | Name-Giver |
---|---|
DarkHotel | Kaspersky |
APT-C-06 | Qihoo 360 |
SIG25 | NSA |
Dubnium | Microsoft |
Fallout Team | FireEye |
Shadow Crane | CrowdStrike |
CTG-1948 | SecureWorks |
Tungsten Bridge | SecureWorks |
ATK 52 | Thales |
Higaisa | Tencent |
T-APT-02 | Tencent |
Luder | ? |
Zigzag Hail | Microsoft |
TieOnJoe | ? |
Purple Pygmy | PWC |
Country
Sponsor
State-sponsored
Motivation
- Information theft and espionage
First Seen
2007
Observed Sectors
- Defense
- Energy
- Government
- Healthcare
- Hospitality
- NGOs
- Pharmaceutical
- Research
- Technology
- Chinese institutions abroad
Observed Countries
- Afghanistan
- Armenia
- Bangladesh
- Belgium
- China
- Ethiopia
- Germany
- Greece
- Hong Kong
- India
- Indonesia
- Malaysia
- Ireland
- Israel
- Italy
- Japan
- Kazakhstan
- Kyrgyzstan
- Lebanon
- Malaysia
- Mexico
- Mozambique
- North Korea
- Pakistan
- Philippines
- Russia
- Saudi Arabia
- Serbia
- Singapore
- South Korea
- Taiwan
- Tajikistan
- Thailand
- Turkey
- UAE
- UK
- USA
- Vietnam
- others
Tools
- Asruex
- DarkHotel
- DmaUp3.exe
- GreezeBackdoor
- Karba
- msieckc.exe
- Nemim
- Pioneer
- Ramsay
- Retro
- Tapaoux
- various 0-days from the {{Hacking Team}} breach
Operations
- 2010: Operation “DarkHotel” Target: The travelers are often top executives from a variety of industries doing business and outsourcing in the APAC region. Targets have included CEOs, senior vice presidents, sales and marketing directors and top R&D staff. Method: spear-phishing targets with highly advanced Flash zero-day exploits that effectively evade the latest Windows and Adobe defenses, and yet they also imprecisely spread among large numbers of vague targets with peer-to-peer spreading tactics. Moreover, this crew’s most unusual characteristic is that for several years the Darkhotel APT has maintained a capability to use hotel networks to follow and hit selected targets as they travel around the world. https://securelist.com/the-darkhotel-apt/66779/ https://www.recordedfuture.com/dark-hotel-malware/
- 2015: Darkhotel’s attacks in 2015 https://securelist.com/darkhotels-attacks-in-2015/71713/
- 2015-12: Operation “Daybreak” Method: Uses Flash zero-day exploit for CVE-2015-8651. Note: not the same operation as Reaper, APT 37, Ricochet Chollima, ScarCruft’s Operation “Daybreak”.
- 2016-09: Operation “Inexsmar” Target: seems to be used in a campaign that targets political figures rather than the usual corporate research and development personnel, CEOs and other senior corporate officials. Method: This attack uses a new payload delivery mechanism rather than the consecrated zero-day exploitation techniques, blending social engineering with a relatively complex Trojan to infect its selected pool of victims. https://labs.bitdefender.com/2017/07/inexsmar-an-unusual-darkhotel-campaign/
- 2018-04: Analysis of CVE-2018-8174 VBScript 0day and APT actor related to Office targeted attack https://blog.360totalsecurity.com/en/analysis-cve-2018-8174-vbscript-0day-apt-actor-related-office-targeted-attack/
- 2018-08: Darkhotel APT is back: Zero-day vulnerability in Microsoft VBScript is exploited https://blog.360totalsecurity.com/en/darkhotel-apt-is-back-zero-day-vulnerability-in-microsoft-vbscript-is-exploited/
- 2020-01: Darkhotel uses a new Zero-day vulnerability in the Internet Explorer scripting engine http://www.geekpark.net/news/254734
- 2020-03: On March 15, 2020, ATR identified a malicious .lnk file that utilizes an infection chain similar to other known APT groups. This campaign was found to use C2 infrastructure that overlaps with the Korea-based APT group, Higaisia. The lure document, dropped by the .lnk file, was downloaded from the World Health Organization website, and is likely being used to target English-speaking individuals and entities. https://www.anomali.com/blog/covid-19-themes-are-being-utilized-by-threat-actors-of-varying-sophistication#When:14:00:00Z
- 2020-03: Since March this year, more than 200 VPN servers have been compromised and many Chinese institutions abroad were under attack. In early April, the attack spread to government agencies in Beijing and Shanghai. http://blogs.360.cn/post/APT_Darkhotel_attacks_during_coronavirus_pandemic.html
- 2020-05: Ramsay: A cyber-spionage toolkit tailored for air-apped networks https://www.welivesecurity.com/2020/05/13/ramsay-cyberespionage-toolkit-airgapped-networks/
- 2020-05: In this latest incident, Higaisa used a malicious shortcut file ultimately responsible for creating a multi-stage attack that consists of several malicious scripts, payloads and decoy PDF documents. https://blog.malwarebytes.com/threat-analysis/2020/06/higaisa/
- 2020-05: Operation “The Gh0st Remains the Same” In this engagement, the victims received a compressed RAR folder that contained trojanized files. If the malicious files were engaged, they displayed decoy web pages associated with the software company “Zeplin”. https://blog.prevailion.com/2020/06/the-gh0st-remains-same8.html
- 2020-05: Operation “PowerFall” In May 2020, Kaspersky technologies prevented an attack on a South Korean company by a malicious script for Internet Explorer. Closer analysis revealed that the attack used a previously unknown full chain that consisted of two zero-day exploits: a remote code execution exploit for Internet Explorer and an elevation of privilege exploit for Windows. https://securelist.com/ie-and-windows-zero-day-operation-powerfall/97976/ https://securelist.com/operation-powerfall-cve-2020-0986-and-variants/98329/
- 2021-11: New DarkHotel APT attack chain identified https://www.zscaler.com/blogs/security-research/new-darkhotel-apt-attack-chain-identified
- 2021-12: Suspected DarkHotel APT activity update https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/suspected-darkhotel-apt-activity-update.html
- 2023: Attack Upgraded: Disclosure of DarkHotel Organization’s Latest RPC Attack Components https://paper.seebug.org/3315/
Information
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08070903/darkhotel_kl_07.11.pdf
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08070901/darkhotelappendixindicators_kl.pdf
- https://www.securityweek.com/darkhotel-apt-uses-new-methods-target-politicians
Mitre Attack
Other Information
Uuid
142dc639-1360-4a2d-a839-11e62ca724e4
Last Card Change
2025-06-28