Description

A newly identified threat actor, CeranaKeeper, is linked to data exfiltration attacks across Southeast Asia, particularly targeting governmental institutions in Thailand since 2023. Slovak cybersecurity firm ESET attributes these activities to Chinese state-sponsored cyber operations, drawing parallels to the Mustang Panda actor. CeranaKeeper demonstrates a high level of adaptability, frequently updating its backdoor mechanisms to evade detection while employing a variety of methods for extensive data theft. The group exploits popular cloud services like Dropbox and OneDrive to deploy custom backdoors and extraction tools. In addition to Thailand, CeranaKeeper has targeted Myanmar, the Philippines, Japan, and Taiwan, regions historically affected by Chinese cyber operations. ESET describes the group as relentless and innovative, capable of lateral movement within compromised networks to siphon vast amounts of data. CeranaKeeper uses several key tools in its operations, including WavyExfiller, a Python uploader for harvesting data via Dropbox and PixelDrain; DropboxFlop, a modified reverse shell utilizing Dropbox for command-and-control; OneDoor, a C++ backdoor leveraging Microsoft OneDrive for file transfers; and BingoShell, which exploits GitHub’s pull request feature for covert actions. These tools facilitate the group's sophisticated data exfiltration efforts. Organizations in Southeast Asia are urged to enhance their cybersecurity defenses, conduct regular system updates, and train employees to recognize phishing threats to mitigate risks associated with this emerging threat.