Breaking

Flagpro malware is threatening enterprises and is backed by Chinese hackers

Japanese companies are being targeted by a novel malware called Flagpro developed by BlackTech cyber-espionage APT group.

The actors are using the Flagpro malware for network reconnaissance and start understanding the network environment and then proceed with the next stage of infiltration by downloading additional payloads.

Flagpro malware breaches enterprise networks

Like any other malware, Flagpro also starts with phishing email specifically crafted for the target environment and disguising itself is a legitimate sender. The phishing email comes with a ZIP file that is password protected and has an Excel file inside of it. This excel file has a macro code inside of it which when executed creates an exe file.

Once Flagpro is inside your network, it will first connect with the C2 server and transmits system details using the hard coded OS commands. Later, C2 server will send back further commands or a payload to enhance Flagpro malware’s modus operandi.  The communication between Flagpro and C2 server in encoded with Base64 and there are delay mechanisms that is incorporated purposely to avoid detection.

As per report from NTT Security, the Flagpro malware is being targeting Japanese firms for over an year now. The firms are from multiple verticals including defense, telecommunications, media, and more.

Flagpro malware has a newer version now

NTT researchers have also identified a newer version of Flagpro malware that is now able to erase external communication with C2 server, thus reducing the suspicion.  The newer version targeting Japan, Taiwan and English-speaking countries.

Entity behind Flagpro malware

The TrendMicro researchers identified the BlackTech APT  group in 2017  and was associated with China. In February 2021, a Unit 42 reported  BlackTech entities with WaterBear entity, which was again suspected to be a Chinese organization. BlackTech is capable of adjusting the tools to modify their attack vector and enhance Flagpro capabilities for further stealthier operation.

The NTT report have also mentioned that BlackTech is developing several malware like Flagpro, and they recently detected ‘SelfMake Loader’ and ‘Spider RAT’ malware. Security professionals need to see the patterns to detect Flagpro malware and follow the security best practices to keep their network environment safe.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago