Hackers targeting Southeast Asia are using a previously undocumented Windows backdoor called HazyBeacon.

Government agencies across Southeast Asia have become the focus of a sophisticated cyber-espionage campaign, according to recent threat intelligence reports. The campaign, attributed to an advanced threat group tracked as CL-STA-1020, employs a previously undocumented Windows backdoor dubbed HazyBeacon and leverages innovative methods to evade detection, raising new concerns about the security of cloud-based infrastructure.

Innovative Command-and-Control via AWS Lambda

At the heart of the campaign is HazyBeacon, a custom-developed backdoor designed to maintain persistent access to compromised government systems and facilitate the exfiltration of sensitive data. What sets this campaign apart is its use of Amazon Web Services (AWS) Lambda URLs as the primary command-and-control (C2) channel. By utilizing AWS Lambda’s serverless functions, attackers are able to communicate with infected systems over encrypted HTTPS connections, effectively blending their malicious traffic with legitimate cloud activity.

This technique not only provides attackers with a scalable and reliable C2 infrastructure but also significantly complicates detection efforts. Traditional security tools often struggle to distinguish between benign and malicious cloud service traffic, allowing threat actors to operate under the radar for extended periods.

Covert Data Exfiltration

In addition to the novel C2 mechanism, the attackers further obfuscate their operations by exfiltrating stolen data through reputable cloud storage services. This approach enables them to bypass conventional network monitoring solutions, as the data transfer appears consistent with normal business operations.

Focused Intelligence Gathering

Analysis indicates that the primary objective of this campaign is covert intelligence collection, with a particular emphasis on information related to tariffs and trade disputes. The targeting of governmental agencies suggests a high level of sophistication and strategic intent, consistent with state-sponsored espionage operations.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply