Table of Contents
March 5, 2025
|
9m

Sandman APT


A futuristic hourglass with golden digital sand and interconnected network nodes, symbolizing time-sensitive cyber threats and evolving cybersecurity challenges.

The cybersecurity landscape has recently seen the emergence of a sophisticated new threat actor, dubbed "Sandman APT," characterized by its stealthy operations and the deployment of a novel modular backdoor named "LuaDream." This threat actor has been observed targeting telecommunications providers across the Middle East, Western Europe, and the South Asian subcontinent, indicating a strategic focus on regions of significant geopolitical interest. The discovery of Sandman APT and its associated LuaDream backdoor, documented by SentinelLabs in August 2023, marks a significant development in the ever-evolving world of cyber espionage. This article serves as a deep dive into the Sandman APT, analyzing its origins, evolution, tactics, techniques, procedures (TTPs), targets, victimology, notable attack campaigns, defense strategies, and finally, offering concluding insights.

Origins & Evolution

Sandman APT first came to light in August 2023, when SentinelLabs identified its operations targeting the telecommunications sector. While the group is relatively new, its sophisticated tactics and use of the novel LuaDream backdoor suggest a well-resourced and experienced actor.

The attribution of Sandman APT remains uncertain, with no definitive links to previously known threat groups. However, several indicators suggest a possible connection to China-based actors. The most compelling evidence is the co-location of LuaDream and KEYPLUG malware on victim networks, along with overlaps in infrastructure and development practices. KEYPLUG is a backdoor associated with multiple Chinese APT groups, including STORM-0866/Red Dev 40.

Further, analysis of LuaDream reveals a code comment written in Chinese. Based on these findings, SentinelLabs assesses with moderate confidence that Sandman has connections to Chinese cyberespionage activities. However, they currently track Sandman as a separate cluster due to its unique Lua-based malware and some differences in operational behavior.

The use of Lua for the backdoor is particularly notable, as this programming language has historically been more commonly associated with Western-aligned threat actors. Examples include Flame, Animal Farm (SNOWGLOBE), and Project Sauron. The adoption of Lua by Sandman, potentially a China-linked group, may indicate a shift in tool development or the influence of shared code or development resources.

The evolution of Sandman's infrastructure has also been observed. Initially, the group used direct connections to C2 (Command and Control) servers. However, they later transitioned to using a load-balancing infrastructure, which helps conceal the actual location of their C2 servers. This demonstrates an improvement in operational security and a desire to evade detection.

Tactics & Techniques

Sandman APT employs a range of sophisticated tactics, techniques, and procedures (TTPs) designed for stealth and persistence. Their operations are characterized by deliberate, slow infiltration, with significant time gaps (e.g., five days) between compromising different endpoints within the same target network. This "low and slow" approach is a key strategy to avoid detection by security systems.

Key Attack Stages:

1. Initial Access: While the precise initial access vectors used by Sandman remain undisclosed, common methods for APTs include spear-phishing emails with malicious attachments or links, exploitation of vulnerabilities in internet-facing applications, or the use of stolen credentials.

2. Credential Theft & Reconnaissance: Once inside the network, Sandman focuses on stealing credentials and performing reconnaissance to identify valuable targets. This is a common initial step for many APTs.

3. Lateral Movement: Sandman utilizes techniques like pass-the-hash to move laterally through the network. They have been observed targeting the workstations of managerial personnel, suggesting a focus on acquiring access to sensitive data or privileged accounts.

4. Persistence: Sandman achieves persistence through DLL hijacking. Specifically, they use a malicious ualapi.dll file that is loaded by the Fax or Spooler service. Notably, they do not immediately restart these services to trigger the exploit. Instead, they wait for a system reboot, further demonstrating their patient and stealthy approach.

5. Deployment of LuaDream: The LuaDream backdoor is the core of Sandman's operations. Its deployment is a multi-stage process, executed entirely in memory to evade file-based detection. This intricate seven-stage process involves using fully formed DLL PE images, LuaJIT bytecode, and various anti-debugging techniques.

LuaDream's Evasion Techniques:

  • LuaJIT Platform: The use of LuaJIT allows for the obfuscation of malicious Lua code, making static analysis more difficult.

  • In-Memory Execution: The entire staging process and the backdoor itself operate in memory, avoiding writing malicious files to disk.

  • Anti-Debugging: LuaDream incorporates techniques to hide threads from debuggers and detect sandbox environments.

  • PE Image Mapping: It maps malicious PE images into memory to evade EDR (Endpoint Detection and Response) API hooks.

  • Encryption and Compression: XOR-based encryption and compression are used for next-stage code, further hindering analysis.

LuaDream Backdoor Capabilities:

  • Modularity: LuaDream has a modular architecture that supports plugins, allowing for the addition of new functionalities as needed.

  • Multi-Protocol C2: It supports TCP, HTTPS, WebSocket, and QUIC for communication with C2 servers.

  • System/User Information Exfiltration: It gathers and exfiltrates system and user information, including assigned IP and MAC addresses, OS version, available memory, username, and process ID.

  • Plugin Management: It can load, unload, and execute attacker-provided plugins.

Targets or Victimology

Sandman APT's primary target sector is telecommunications providers. This focus is consistent with espionage objectives, as telecommunications companies possess vast amounts of sensitive data, including call records, location data, and potentially the content of communications.

The geographic distribution of Sandman's targets includes the Middle East, Western Europe, and the South Asian subcontinent. This aligns with China's strategic interests in these regions, particularly concerning infrastructure projects and economic influence. The specific countries targeted within these regions have not been publicly disclosed.

The potential impact of successful Sandman operations includes:

  • Data Breaches: Exfiltration of sensitive customer data, trade secrets, and potentially classified information.

  • Operational Disruption: While not the primary objective, disruption of telecommunications services is a possible consequence.

  • Geopolitical Espionage: Access to sensitive communications and data could provide valuable intelligence for political and economic decision-making.

  • Supply Chain compromise: What is supply chain attack?

Attack Campaigns

While specific details of Sandman APT's attack campaigns have not been widely publicized, the following summarizes the key known activities:

  • August 2023: SentinelLabs discovers Sandman APT targeting telecommunications providers. The discovery is based on the identification of the LuaDream backdoor and its deployment methods.

  • Ongoing Activity: Sandman is considered an active threat, with ongoing operations targeting the telecommunications sector.

  • Infrastructure Management: Observed the transition to Load-balancing C2.

Defenses

Defending against a sophisticated threat actor like Sandman APT requires a multi-layered security approach that combines preventative measures, detection capabilities, and incident response planning. Here are some recommended defense strategies:

  1. Patching and Updates: Regularly update all systems and software, particularly internet-facing applications and network infrastructure. This is crucial for mitigating the risk of exploitation of known vulnerabilities.

  2. Network Segmentation: Implement robust network segmentation to limit lateral movement. This will restrict an attacker's ability to move freely within the network even if they gain initial access.

  3. Endpoint Protection: Deploy advanced endpoint protection solutions (EDR) that can detect and prevent malicious activities like process injection, code execution, and fileless malware. One should know essential strategies for managing information security.

  4. Threat Intelligence: Stay informed about the latest threat intelligence, including indicators of compromise (IOCs), malware signatures, and TTPs associated with Sandman APT and similar groups.

  5. User Training: Train employees to recognize phishing attempts and other social engineering tactics. A well-informed workforce is a crucial defense against initial access attempts. Also, check the types of phishing attacks.

  6. Intrusion Detection and Response: Implement robust intrusion detection systems (IDS) and incident response plans to detect and respond to suspicious activities and lateral movement. One should know what a CIRP should have.

  7. Principle of Least Privilege (PoLP): Enforce the principle of least privilege, restricting user and system access to the minimum necessary levels.

  8. Threat Hunting: Conduct regular threat hunting exercises to proactively search for signs of compromise within the network.

  9. Network Monitoring: Implement robust network monitoring to detect unusual or unauthorized traffic that may be linked to the Sandman APT. Pay close attention to outbound connections to suspicious domains or IP addresses, particularly those associated with known C2 infrastructure. Consider security logging and monitoring.

  10. File Integrity Monitoring: Regularly check the integrity of system files, including DLL files, particularly within the %ProgramData%\FaxConfig and %ProgramData%\FaxLib paths.

  11. Log Review Review the security logs and look for the creation of new file paths and modifications of old ones. Also, understanding essential Windows directories is important.

Indicators of Compromise (IOCs):

Indicator Type
Indicator Value
Description
Domain
mode.encagil[.]com
C2 domain
Domain
ssl.explorecell[.]com
C2 domain
SHA1 Hash
e9595597d81b1c7c19f51e669f8711d087c882c8
fax.dat file
SHA1 Hash
6df955735a804c5ae9b9f9578d2c81f4713d5b41
fax.Application file
SHA1 Hash
6cfd5001275f50b99c57f4d1210385971a18a11a
ualapi.dll file
SHA1 Hash
171c52d3fd246b15a971b61f846b484c08f85549
fax.cache file
SHA1 Hash
09f70e1b685d5a443a694a6f33a9ad6e52106c05
UpdateCheck.dll file
SHA1 Hash
a9f58dd0379f4f25c3f40a716381f8749911910e
updater.ver file
SHA1 Hash
e985a6d20d148145a9412a94b0d47137786f794b
fax.module file
File Path
%ProgramData%\FaxConfig
LuaDream folder
File Path
%ProgramData%\FaxLib
LuaDream folder
IP Address
C2 IP Address

Conclusion

Sandman APT represents a significant threat to organizations, particularly in the telecommunications sector. Their sophisticated tactics, stealthy operations, and use of the novel LuaDream backdoor make them a challenging adversary to detect and defend against. The possible links to China-based actors using KEYPLUG add another layer of complexity to the threat landscape. Organizations must prioritize proactive security measures, threat intelligence sharing, and continuous monitoring to mitigate the risks posed by Sandman and similar APT groups. The ongoing research and collaboration between cybersecurity firms and intelligence agencies are crucial for staying ahead of this evolving threat. One can explore ethical hacking as a career.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Threats

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe