Tencent Trouble: SLOW#TEMPEST Cyberattack Targets Chinese Entities with Phishing and Cobalt Strike

Tencent’s infrastructure is under siege! Securonix researchers uncovered a phishing, DLL sideloading, and Cobalt Strike campaign targeting Chinese entities. Dubbed “SLOW#TEMPEST,” the attack exploited Tencent’s cloud services and lurked for weeks before striking. Looks like even the cloud isn’t safe from a tempest!

Pro Dashboard

Hot Take:

Looks like the cybercriminals took a page out of a slow-cooking recipe book—SLOW#TEMPEST: where your data gets cooked to perfection while you wait! Tencent, hope you’ve got a storm shelter ready.

Key Points:

  • Cybercriminals targeted Chinese entities with phishing emails involving “personnel lists” and “remote control software regulations.”
  • Used DLL sideloading via a vulnerable LicensingUI.exe and dui70.dll to deploy Cobalt Strike beacons.
  • Cobalt Strike was utilized for various malicious activities like malware delivery and network reconnaissance.
  • All IP addresses for the attack were hosted on Tencent’s cloud infrastructure.
  • The attack was named SLOW#TEMPEST due to the attackers’ extended period of inactivity before launching their offensive.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?