×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Eset
  • ESET discovers cerankeeper, new apt group aligned in China

Customer Press Room

ESET discovers cerankeeper, new apt group aligned in China

by Grandangolo Communications / Friday, 04 October 2024 / Published in Eset

The group constantly updates its backdoors to avoid detection and diversifies methods to facilitate mass data exfiltration. It also leverages legitimate cloud and file sharing services, such as Dropbox, GitHub, and OneDrive, to implement custom backdoors

Researchers of ESET, a global European leader in the cybersecurity market, have uncovered several targeted campaigns against government institutions in Thailand that, starting in 2023, were able to exfiltrate massive amounts of data. The campaigns leveraged legitimate file sharing services such as Dropbox, PixelDrain, GitHub, and OneDrive. Based on their findings, ESET researchers decided to trace this cluster of activity as the work of a specific threat actor, which ESET named CeranaKeeper. The numerous occurrences of the string "bectrl" in the code of the group's tools inspired the name: a play on words between the term "beekeeper" and the bee species Apis Cerana, or Asian honey bee. ESET presented its findings on CeranaKeeper and the compromise in Thailand at the Virus Bulletin 2024 conference.

CeranaKeeper, responsible for attacks on the Thai government, appears particularly aggressive, with a multitude of rapidly and continuously evolving tools and techniques used. Operators write and rewrite their toolset as needed, reacting quickly to avoid detection. The goal of this group is to collect as many files as possible and to this end it develops specific components. CeranaKeeper uses cloud and file-sharing services for exfiltration, likely counting on the fact that traffic to these popular services appears mostly legitimate and harder to block when identified.

CeranaKeeper has been active since at least early 2022, and primarily targets government entities in Asia, such as Thailand, Myanmar, the Philippines, Japan and Taiwan.

The attacks in Thailand leveraged revised versions of components previously attributed by other researchers to the China-aligned APT group, MustangPanda, and then a new toolset capable of hijacking service providers such as Pastebin, Dropbox, OneDrive, and GitHub to execute commands on compromised computers and exfiltrate sensitive documents. However, analysis of tactics, techniques, procedures, code and infrastructure discrepancies led ESET to deem it necessary to consider CeranaKeeper and MustangPanda as two separate entities. Both China-aligned groups could share information and a subset of tools for a common interest or through a third party.

"Despite some similarities in their activities, such as common goals and similar archive formats, ESET observed organizational and technical differences between the two groups, for example in toolsets, infrastructure, procedures and campaigns. We also noticed differences in the way the two groups carry out similar tasks," explains Romain Dumont, ESET researcher who discovered CeranaKeeper.

CeranaKeeper likely uses a publicly documented toolset called “bespoke stagers” (or TONESHELL), which makes extensive use of a side-loading technique and uses a specific sequence of commands to exfiltrate files from a compromised network. In the activities carried out, CeranaKeeper uses components known to be exclusive to the group and for their exclusive use. Additionally, the group left some metadata in their code that provided ESET with additional information about the development process, further solidifying the attribution to CeranaKeeper.

After gaining privileged access, the attackers installed the TONESHELL backdoor, deployed a credential dump tool, and used a legitimate Avast driver and custom application to disable security products on the machine. From the compromised server, they used a remote administration console to deploy and run their backdoor on other computers on the network. The group deployed a new BAT script across the network, extending its reach to other computers by leveraging the domain controller to gain Admin privileges.

In the attack against the Thai government, attackers identified and selected compromised computers of interest to deploy previously undocumented custom tools that were used not only to facilitate the exfiltration of documents to public storage services, but also as alternative backdoors. One particularly noteworthy technique used by the group leverages GitHub's pull request and issue comment functions to create a hidden reverse shell, leveraging GitHub, a popular online platform for sharing and collaborating on code, as a Command & Control (C&C) server.

For a more detailed analysis and technical breakdown of CeranaKeeper tools, see the latest ESET Research white paper “CeranaKeeper: A relentless, shape-shifting group targeting Thailand” on WeLiveSecurity.com. Follow ESET Research on Twitter (now known as X) For the latest news from ESET Research.

Tagged under: Eset

About Grandangolo Communications

What you can read next

AAA - Maximum score for ESET Endpoint Security
ESET Research: CosmicBeetle teams up with other ransomware groups and targets companies in Europe and Asia
ESET Threat Intelligence data feeds improve visibility for users of the Microsoft Sentinel SIEM/SOAR platform

Customer Press Room

  • Vertiv introduces backup power for personal devices and business applications

    Vertiv™ PowerUPS 200 Series is a ...
  • Sandworm Group Hits Energy Company in Poland with DynoWiper: ESET Research Analysis

    ESET researchers have identified DynoWip...
  • Antonio Menghini is the new Chief Commercial Officer of Innovaway

    At the same time, Giuseppe Piccolo took over ...
  • Vertiv introduces a new AI-powered predictive maintenance service for modern data centers and AI factories

    Vertiv™ Next Predict is a new service...
  • Vertiv expands flexible, energy-efficient edge cooling system for small, medium and edge applications in EMEA

    The Vertiv perimeter cooling system...

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • Abstract
  • abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Innovaway
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP