Table of Contents
March 11, 2025
|
9m

Dark Pink APT Group


A futuristic, ethereal woman in pink hues with a cybernetic aura, surrounded by flowing data streams and binary code, symbolizing cyber espionage and digital mysticism.

Dark Pink, also known as Saaiwc Group by some Chinese researchers, is a relatively new and sophisticated Advanced Persistent Threat (APT) group primarily focused on cyber espionage. Active since at least mid-2021, Dark Pink has demonstrated a remarkable ability to remain stealthy while targeting high-value organizations across Southeast Asia and, to a lesser extent, Europe. The group employs custom malware, advanced evasion techniques, and a multi-stage attack methodology, making them a significant threat to governmental bodies, military organizations, educational institutions, and non-profit organizations. This article provides a deep dive into Dark Pink's origins, tactics, techniques, and procedures (TTPs), targets, and defensive strategies to help security professionals combat this evolving threat.

Origins & Evolution

Dark Pink's origins can be traced back to at least mid-2021, with the first confirmed successful attack occurring in June 2022. The group's operational tempo and geographic focus suggest a likely origin in the Southeast Asia region. This is supported by observations of attack times aligning with the Indochina Peninsula Standard Time (UTC+7).

While definitive attribution to a specific nation-state remains elusive, there are intriguing, though unconfirmed, connections to other known APT groups. Some researchers theorize a potential link to OCEAN BUFFALO (also known as APT32, OceanLotus, or SeaLotus), a well-established Vietnamese state-sponsored group known for its cyber espionage activities since 2012. However, this connection is currently speculative, based on overlapping targeting and regional focus, rather than concrete technical evidence. Additionally, Dark Pink has been observed exploiting the same vulnerability (CVE-2017-0199) as APT-C-35, an Indian state-sponsored group. This could indicate shared resources, techniques, or even potential collaboration, but it could also be coincidental.

Dark Pink has continuously evolved its tactics and tools to evade detection. Early attacks relied on a relatively straightforward attack chain, but recent campaigns have incorporated more sophisticated techniques, including DLL side-loading and obfuscation. The group's custom malware, particularly KamiKakaBot, has also undergone improvements, demonstrating a commitment to ongoing development and refinement of their capabilities. This adaptability makes Dark Pink a particularly challenging threat to track and mitigate.

Tactics & Techniques

Dark Pink's operations are characterized by a multi-stage attack methodology, starting with spear-phishing and culminating in data exfiltration. Their TTPs can be broken down as follows:

  • Initial Access: The primary infection vector is spear-phishing emails. These emails are carefully crafted, often using themes related to ASEAN-Europe relations or job applications, to lure victims into opening malicious attachments. These attachments are typically ISO images containing:

* A legitimate, signed executable file (e.g., WinWord.exe). This is often an older version susceptible to DLL side-loading.

* A malicious DLL file (e.g., MSVCR100.dll). This DLL contains the malware loader.

* A decoy document (e.g., a Word document with a theme like "Concept paper Strategic Dialogue DEU-IDN"). This document often contains XOR-encrypted data used in later stages of the attack.

  • Execution & Persistence: Once the user opens the seemingly legitimate executable from the ISO image, DLL side-loading occurs. The malicious DLL is loaded into the legitimate process's memory, bypassing some security controls. The loader then decrypts the XOR-encrypted payload from the decoy document and writes it to disk (often in C:\Windows\temp). This payload is typically the KamiKakaBot malware in XML format. The loader then uses LOLBINs (Living-Off-the-Land Binaries) like MsBuild.exe to execute the KamiKakaBot payload. Persistence is often achieved by modifying the HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell registry key, abusing the Winlogon Helper DLL mechanism. Another persistence method involves using a Microsoft Excel add-in for TelePowerBot. You can explore the Windows registry structure for better understanding.

  • Command and Control (C2): Dark Pink utilizes Telegram bots for command and control. The KamiKakaBot malware communicates with a Telegram bot, receiving commands and sending exfiltrated data. This use of a popular messaging platform helps to blend C2 traffic with legitimate network activity.

  • Malware (TelePowerBot and KamiKakaBot): Dark Pink employs custom malware, primarily TelePowerBot and KamiKakaBot.

* TelePowerBot: A registry implant that activates during system boot. It connects to a Telegram channel and executes PowerShell commands received from the channel.

* KamiKakaBot: A more advanced .NET-based malware with enhanced data-stealing capabilities. It can steal credentials, cookies, and browsing history from Chrome, Edge, and Firefox. It also features remote code execution capabilities via cmd.exe. KamiKakaBot's functionality is split into two parts: device control and information harvesting, both managed through the Telegram bot.

  • Cucky and Ctealer

* Cucky: A custom information stealer written in .NET, designed to extract passwords, browsing history, login credentials, and cookies from targeted web browsers. It stores the pilfered data locally in the %TEMP%\backuplog directory.

* Ctealer: It is similar to Cucky but is programmed in C/C++.

  • Data Exfiltration: Dark Pink uses various methods for data exfiltration. Historically, they used email and public cloud services like Dropbox. More recently, they have shifted to using the HTTP protocol and webhook services (like webhook[.]site). Webhook services provide temporary, unique URLs that can capture incoming HTTP requests, making it more difficult to track the exfiltration destination.

  • Obfuscation and Evasion: Dark Pink employs several techniques to evade detection:

* DLL Side-Loading: Exploiting the way Windows loads DLLs to execute malicious code under the guise of a legitimate process.

* XOR Encryption: Encrypting the payload within the decoy document to avoid signature-based detection.

* LOLBINs: Using legitimate Windows binaries like MsBuild.exe to execute malicious code.

* Command Line Obfuscation: Using Windows environment variables to obfuscate command lines.

* .NET Obfuscation: Using a .NET obfuscation engine to make the malware more difficult to analyze.

* Github Usage: Github is used to store PowerShell scripts, ZIP archives, and custom malware.

Targets or Victimology

Dark Pink's targeting strategy is highly focused, primarily concentrating on organizations within Southeast Asia, particularly those associated with the Association of Southeast Asian Nations (ASEAN). However, their reach has extended to Europe as well. Their victim profile includes:

  • Governmental Organizations: Ministries and government agencies in countries like Brunei, Indonesia, and others within the ASEAN region.

  • Military Bodies: Military organizations in Southeast Asia, such as those in Thailand and the Philippines.

  • Educational Institutions: Educational organizations, including one in Belgium.

  • Non-Profit Organizations: Non-profit organizations, particularly in Vietnam.

The group's targeting suggests a clear motivation of cyber espionage. They are likely seeking sensitive information related to:

  • Geopolitical Affairs: Information related to ASEAN's diplomatic relations, particularly with European countries.

  • Military Intelligence: Information on military capabilities, strategies, and deployments.

  • Economic Data: Information related to trade, investment, and economic policies.

  • Technological Research: Potentially targeting research and development efforts within educational institutions.

The impact of successful attacks by Dark Pink can be significant, including:

  • Data Breaches: Loss of sensitive government, military, and organizational data.

  • Operational Disruption: Potential disruption of critical government and military operations.

  • Reputational Damage: Damage to the reputation of targeted organizations and governments.

  • Compromised National Security: Potential compromise of national security interests.

  • The group targeted at least 13 organizations across nine countries.

Attack Campaigns

Dark Pink has been linked to several notable attack campaigns:

  1. February 2022: An educational organization in Belgium was targeted.

  2. October 2022: A military body in Thailand was targeted.

  3. Late December 2022: A non-profit organization in Vietnam was targeted.

  4. January and April 2023 New attacks in Brunei, Indonesia, Vietnam, Cambodia, Malaysia, the Philippines, and Bosnia and Herzegovina

  5. Mid-2021 to Present: Ongoing activity targeting government and military organizations, primarily in Southeast Asia, leveraging spear-phishing and custom malware.

These campaigns highlight Dark Pink's consistent focus on espionage and their ability to adapt their techniques over time. The use of lures related to ASEAN-Europe relations in several attacks suggests a deliberate effort to exploit geopolitical contexts. The group has been linked to spoofing documents related to trade. This is another example of supply chain attack.

Defenses

Protecting against Dark Pink requires a multi-layered defense strategy that focuses on both prevention and detection. Here are some key recommendations:

  • Strengthen Email Security: Implement advanced email security solutions that can detect and block malicious attachments, links, and unusual sender behavior. This includes sandboxing, URL analysis, and email authentication protocols (SPF, DKIM, DMARC). To understand more about SPF, see here.

  • Employee Training: Conduct regular security awareness training to educate employees on how to recognize and report suspicious emails, particularly those containing attachments or links. Emphasize the dangers of opening files from untrusted sources.

  • Patch Management: Ensure all systems, especially Microsoft Office and operating systems, are regularly updated and patched to address known vulnerabilities, particularly CVE-2017-0199. Learn more about patch management strategy.

  • Endpoint Detection and Response (EDR): Deploy EDR solutions that can monitor endpoint activity for suspicious behavior, such as unusual process execution, registry modifications, and network connections. Also look for UEBA solutions.

  • Network Segmentation: Implement network segmentation to limit the lateral movement of attackers in case of a successful breach.

  • Principle of Least Privilege (PoLP): Enforce the principle of least privilege, restricting user access to only the resources necessary for their job functions.

  • Monitor for Suspicious Activity: Implement robust security logging and monitoring to detect unusual data transfers, unauthorized access attempts, and changes to system configurations.

  • Threat Intelligence: Leverage threat intelligence feeds and reports to stay informed about Dark Pink's latest TTPs and indicators of compromise (IOCs).

  • Incident Response Plan: Develop and regularly test an incident response plan to ensure a swift and effective response to any potential security incidents. You can make an effective Cyber Incident Response Plan.

  • Disable ISO Mounting (GPO): Disable the ability to mount ISO images via Group Policy (GPO) to prevent the initial execution vector.

  • Disable Browser Password Saving (GPO): Disable the saving of passwords in web browsers via Group Policy (GPO) to mitigate credential theft.

  • Use safe DLL search mode.

  • Advanced Detection: Implement advanced detection mechanisms, such as YARA rules, to identify DLL side-loading and Event Triggered Execution. For automation, SOAR can be helpful.

Conclusion

The Dark Pink APT group represents a significant and evolving cyber espionage threat, particularly to organizations in Southeast Asia. Their sophisticated TTPs, custom malware, and focus on high-value targets make them a formidable adversary. By understanding their methods, targets, and motivations, organizations can implement effective defenses to mitigate the risk of a successful attack. Continuous vigilance, proactive security measures, and a strong emphasis on threat intelligence are crucial for staying ahead of this stealthy and persistent threat actor. The ongoing evolution of Dark Pink's tactics underscores the need for a dynamic and adaptive security posture.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Threats

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe