Winnti’s Wild Ride: Chinese Hackers Target Japan in Cyber Espionage Blitz
Winnti, the notorious China-linked APT group, has been targeting Japanese manufacturing, materials, and energy sectors since March 2024. Dubbed RevivalStone, this cyberespionage campaign employs an enhanced Winnti malware, featuring sneaky evasion techniques and a penchant for DLL hijacking. It’s like Winnti is on a mission to redefine stealth mode!

Hot Take:
Looks like the Winnti group took a page out of a high-stakes spy thriller, targeting Japanese industries with a plot twist that involves SQL injections, sneaky malware, and a penchant for renaming files with whimsical underscores. Forget “Fast and Furious,” this is “Fast and Furiously Hidden!”
Key Points:
- Winnti APT group launched the RevivalStone cyberespionage campaign in March 2024.
- The attack targeted Japanese manufacturing, materials, and energy sectors.
- New evasion techniques and enhanced Winnti malware were employed.
- Attack methods included SQL injection, DLL hijacking, and stealthy malware operations.
- RevivalStone campaign hinted at connections to other malware controllers like TreadStone and StoneV5.
Already a member? Log in here