
The danger actor referred to as Lotus Panda has been seen concentrated on executive, production, telecommunications, and media sectors within the Philippines, Vietnam, Hong Kong, and Taiwan with up to date variations of a recognized backdoor referred to as Sagerunex.
“Lotus Blossom has been the usage of the Sagerunex backdoor since a minimum of 2016 and is increasingly more using long-term patience command shells and creating new variants of the Sagerunex malware suite,” Cisco Talos researcher Joey Chen stated in an research revealed closing week.
Lotus Panda, sometimes called Billbug, Bronze Elgin, Lotus Blossom, Spring Dragon, and Thrip, is a suspected Chinese language hacking group that is energetic since a minimum of 2009. The danger actor was once first uncovered via Symantec in June 2018.

In overdue 2022, Broadcom-owned Symantec detailed the danger actor’s assault on a virtual certificates authority in addition to executive and protection businesses situated in numerous nations in Asia that concerned using backdoors like Hannotog and Sagerunex.
The precise preliminary get right of entry to vector used to breach the entities in the most recent set of intrusions isn’t recognized, even supposing it has a historical past of engaging in spear-phishing and watering hollow assaults. The unspecified assault pathway serves as a conduit for the Sagerunex implant, which is classed to be an evolution of an older Billbug malware referred to as Evora.
The process is noteworthy for using two new “beta” variants of the malware, which leverage reliable products and services like Dropbox, X, and Zimbra as command-and-control (C2) tunnels to evade detection. They have got been so-called because of the presence of debug strings within the supply code.

The backdoor is designed to assemble goal host data, encrypt it, and exfiltrate the main points to a far off server beneath the attacker’s management. The Dropbox and X variations of Sagerunex are believed to had been put to make use of between 2018 and 2022, whilst the Zimbra model is claimed to had been round since 2019.
“The Zimbra webmail model of Sagerunex is not just designed to assemble sufferer data and ship it to the Zimbra mailbox but in addition to permit the actor to make use of Zimbra mail content material to provide orders and management the sufferer system,” Chen stated.
“If there’s a reliable command order content material within the mailbox, the backdoor will obtain the content material and extract the command, another way the backdoor will delete the content material and stay up for a sound command.”
The result of the command execution are therefore packaged within the type of an RAR archive and hooked up to a draft e mail within the mailbox’s draft and trash folders.

Additionally deployed within the assaults are different equipment akin to a cookie stealer to reap Chrome browser credentials, an open-source proxy application named Venom, a program to regulate privileges, and bespoke device to compress and encrypt captured knowledge.
Moreover, the danger actor has been seen operating instructions like web, tasklist, ipconfig, and netstat to accomplish reconnaissance of the objective setting, along with sporting out exams to determine information superhighway get right of entry to.
“If information superhighway get right of entry to is particular, then the actor has two methods: the usage of the objective’s proxy settings to determine a connection or the usage of the Venom proxy device to hyperlink the remoted machines to internet-accessible techniques,” Talos famous.