Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.

Chinese ‘Gallium’ Hackers Using New PingPull Malware in Cyberespionage Attacks

June 13, 2022
PingPull Malware in Cyberespionage Attacks

A Chinese language superior persistent risk (APT) often known as Gallium has been noticed utilizing a beforehand undocumented distant entry trojan in its espionage assaults concentrating on corporations working in Southeast Asia, Europe, and Africa.

Known as PingPull, the “difficult-to-detect” backdoor is notable for its use of the Web Management Message Protocol (ICMP) for command-and-control (C2) communications, in response to new analysis revealed by Palo Alto Networks Unit 42 in the present day.


Gallium is understood for its assaults primarily geared toward telecom corporations courting way back to 2012. Additionally tracked beneath the title Soft Cell by Cybereason, the state-sponsored actor has been related to a broader set of assaults concentrating on 5 main telecom corporations positioned in Southeast Asian international locations since 2017.

Over the previous yr, nonetheless, the group is claimed to have expanded its victimology footprint to incorporate monetary establishments and authorities entities positioned in Afghanistan, Australia, Belgium, Cambodia, Malaysia, Mozambique, the Philippines, Russia, and Vietnam.

PingPull Malware in Cyberespionage Attacks

PingPull, a Visible C++-based malware, supplies a risk actor the flexibility to entry a reverse shell and run arbitrary instructions on a compromised host. This encompasses finishing up file operations, enumerating storage volumes, and timestomping recordsdata.

“PingPull samples that use ICMP for C2 communications situation ICMP Echo Request (ping) packets to the C2 server,” the researchers detailed. “The C2 server will reply to those Echo requests with an Echo Reply packet to situation instructions to the system.”


Additionally recognized are PingPull variants that depend on HTTPS and TCP to speak with its C2 server as an alternative of ICMP and over 170 IP addresses related to the group since late 2020.

It isn’t instantly clear how the focused networks are breached, though the risk actor is understood to take advantage of internet-exposed functions to achieve an preliminary foothold and deploy a modified model of the China Chopper internet shell to determine persistence.

“Gallium stays an lively risk to telecommunications, finance and authorities organizations throughout Southeast Asia, Europe and Africa,” the researchers famous.

“Whereas using ICMP tunneling is just not a brand new approach, PingPull makes use of ICMP to make it harder to detect its C2 communications, as few organizations implement inspection of ICMP visitors on their networks.”

Posted in SecurityTags:
Write a comment