4/16 (三) 15:30 - 16:00 4F 展區會議室 4B

SneakyChef Espionage Campaign: Unveiling the Multi-Staged attack on Global Government entities

This presentation is about a malicious campaign operated by a Chinese-speaking threat actor, SneakyChef, targeting government agencies, likely the Ministry of External/ Foreign Affairs or Embassies of various countries since as early as 2023, using SugarGh0st RAT and SpiceRAT.  

Talos assesses with high confidence that SneakyChef operators are likely Chinese-speaking based on their language preferences, usage of the variants of Chinese’s popular malware of choice, Gh0st RAT, and the specific targets, which include the Ministry of External Affairs of various countries and other government entities with the motive of Espionage and data theft. 

Their notable TTPs include Spear-Phishing campaigns, DLL Side-Loading, custom c2 communication protocol, and abusing legitimate applications.

SneakyChef has used various techniques in this campaign with multi-staged attack chains to deliver the payload SugarGh0st and SpiceRAT. Throughout this presentation, I will discuss various attach-chains and the techniques the threat actor has employed to establish persistence, evade the detections, and implant the RATs successfully. 

Finally, I will share the indications of SneakyChef’s origin as a Chinese-speaking actor and the attribution of the SugarGh0st and SpiceRAT attacks to them. 

Chetan Raghuprasad
講者
Cisco Talos
Threat Researcher, Threat Intelligence

TOPIC / TRACK
Threat Research 論壇
Live Translation Session

LOCATION
臺北南港展覽二館
4F 展區會議室 4B

LEVEL
進階 進階議程為對資安主題的深入探討,包含資安架構與工具、最佳實作經驗分享,以及資安策略比較,內容常有程式碼、通訊協定分析、逆向解析、實機示範等解說,適合具備經驗的資安與資訊人員。

SESSION TYPE
Breakout Session

LANGUAGE
英文
即時中英文翻譯

SUBTOPIC
Advanced Threat
Threat Intelligence Sharing
Threat Research