• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Intruders Latest Cybersecurity News

China-based AP10 target Taiwanese Financial Institutions using Quasar RAT

John Greenwood Posted On February 23, 2022
0



China-based APT10

A China-based AP10 hacking group that is supported by the Chinese government has carried out a cyberattack on Taiwan’s financial sector by exploiting a vulnerability in a security software which is used by 80 percent of local financial institutions.

The attacks on Taiwan is believed to have been started by November 2021 and was happening until this month as per CyCraft Report.  The CyCraft has marked the incident as ‘Operation Cache Panda’ and linked it to Chinese cyber-espionage group called the APT10 (a state-sponsored organization).

CyCraft stated that they name of the product exploited by APT10 can’t be shared as there is a law enforcement investigation that is happening now and the vendor is working on a emergency patch to fix the situation across institutions.

China-based APT10 mask it with credential stuffing but infiltrate networks using RAT

The company first observed a credential stuffing attack in November 2021, where the hackers accessed some trading accounts and performed irregular mass transactions on the Hong Kong stock market.

China-based APT10
Source: CyCraft

However, after some detailed investigation and analysis from CyCraft it is found that the credential stuffing attack carried out by APT10 was just a mask to cover their main objectives. The China-based APT10 hacking group exploited a vulnerability in security software solution (name of the product is yet to be revealed), and deployed a ASPXCSharp Web Shell. The attackers then used a tool called Impacket and scanned the company’s network completely.

Once the scanning is done, the China-based AP10 organization used a unique technique called reflective code loading to run and execute malicious code on systems to install a version of Quasar RAT. With this RAT installed the hackers were able to remotely access the internal network and its systems using the reverse RDP tunnels. The details were gathered by CyCraft when one of the affected customers disclosed the case to the company.

China-based AP10 hackers and their new intrusion techniques

As per CyCraft, it was two separate cyberattacks on Taiwanese Financial Entities, and the hackers have used advanced obfuscation techniques that wasn’t seen earlier.

And considering the attack motive, digital footprints and the political situation between Taiwan and China, the objective doesn’t seem to be monetary benefits. It is clearly a geo-political warfare, and the intention is to cause hindrance to Taiwanese organizations and their operations.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Twitter, and Reddit.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


China-based AP10China-based AP10 hacking groupCybersecuritydata securityRansomware attack


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
Top 9 Best Log Management Tools for 2025
September 20, 2025
Top 4 Remote Support Tools for 2025- Best Remote Support Solution
September 18, 2025
Top 5 Best Unified Endpoint Management (UEM) Software for 2025
September 12, 2025
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search