DarkHotel APT group targeting the Hospitality Industry in China
For a detailed advisory, download the pdf file here
DarkHotel, a South Korean advanced persistent threat (APT), has been targeting premium hotels in Macao, China, since November 2021. The APT group is active since 2007 and has been actively targeting critical sectors such as hotels, government, automotive, and pharmaceutical industries, focusing on surveillance and data theft, with company and industry leaders identified as targets.
The group carried out the attack with a spear phishing email that seemed to be from the “Macao Government Tourism Office” and was directed to management personnel of luxury hotels, including front office and HR employees. The emails featured an Excel sheet bait demanding the completion of a form for a guest query, and if the victim enables macros in order to read the document, the macros activate the download and execution of malware payloads. The malware function is meant to generate a scheduled task for persistence and the execution of VBS and PowerShell scripts for establishing a connection to a hard-coded command-and-control (C2) server disguised as a web server.
The Mitre TTPs used by DarkHotel are:
TA0001 – Initial Access
TA0003 – Persistence
TA0007 – Discovery
TA0005 – Defense Evasion
TA0002 – Execution
TA0011 – Command and Control
T1566.001: Phishing: Spearphishing Attachment
T1204.002: User Execution: Malicious File
T1059.005: Command and Scripting Interpreter: Visual Basic
T1070.004: Indicator Removal on Host: File Deletion
T1106: Native API
T1012: Query Registry
T1053: Scheduled Task
T1064: Scripting
T1071: Standard Application Layer Protocol
T1059.001: Command and Scripting Interpreter: PowerShell
Actor Details
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox