TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
TheWizards, a China-aligned APT group, employs Spellbinder, a lateral movement tool for adversary-in-the-middle attacks through IPv6 SLAAC spoofing. This technique allows them to intercept network traffic and redirect legitimate Chinese software updates to malicious servers. The group targets individuals, gambling companies, and entities in Southeast Asia, UAE, China, and Hong Kong. Their malware chain includes the WizardNet backdoor and utilizes DNS hijacking to deliver malicious updates. Evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting it may be a digital quartermaster for this APT group. The attackers use sophisticated tools and techniques to evade detection and maintain persistence on compromised systems.
AI Analysis
Technical Summary
TheWizards is a China-aligned advanced persistent threat (APT) group that has been observed employing a sophisticated attack technique involving IPv6 SLAAC (Stateless Address Autoconfiguration) spoofing to conduct adversary-in-the-middle (AiTM) attacks. Their toolset includes Spellbinder, which facilitates lateral movement within compromised networks by exploiting IPv6 network configuration protocols. By spoofing SLAAC messages, TheWizards can manipulate network traffic flows, intercepting and redirecting legitimate software update requests—specifically targeting Chinese software updates—to malicious servers under their control. This redirection enables the delivery of malicious payloads disguised as legitimate updates, thereby compromising targeted systems without raising immediate suspicion. The malware chain used by TheWizards includes the WizardNet backdoor, which provides persistent remote access and control over infected hosts. Additionally, the group leverages DNS hijacking techniques to further ensure the delivery of malicious updates and maintain control over network communications. The campaign targets individuals and organizations primarily in Southeast Asia, the UAE, China, and Hong Kong, with a focus on gambling companies among other entities. Attribution evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting a possible front or digital quartermaster role supporting the group’s operations. The attackers demonstrate advanced operational security and evasion capabilities, making detection and mitigation challenging. This attack vector is notable for exploiting IPv6 network protocols, which are increasingly deployed but often less monitored than IPv4, thereby expanding the attack surface for lateral movement and network traffic interception.
Potential Impact
For European organizations, the threat posed by TheWizards’ SLAAC spoofing and adversary-in-the-middle attacks could be significant, especially for entities that rely on IPv6 infrastructure or have business relationships with Chinese software vendors. The interception and redirection of software updates could lead to the installation of backdoors like WizardNet, enabling long-term espionage, data exfiltration, and potential disruption of critical services. Organizations in sectors such as gambling, finance, telecommunications, and any with supply chain dependencies involving Chinese software are at heightened risk. The stealthy nature of the attack, combined with the use of DNS hijacking and lateral movement tools, increases the likelihood of persistent compromise and lateral spread within networks. This could result in intellectual property theft, regulatory non-compliance due to data breaches, and operational disruptions. Moreover, the exploitation of IPv6 SLAAC spoofing highlights a relatively under-monitored attack vector that could bypass traditional IPv4-centric security controls common in many European enterprises. Given the geopolitical tensions and the strategic importance of cybersecurity in Europe, such attacks could also have broader implications for national security and critical infrastructure protection.
Mitigation Recommendations
European organizations should implement several targeted measures to mitigate this threat beyond generic best practices: 1) Enhance IPv6 network monitoring and logging to detect anomalous SLAAC messages and unauthorized router advertisements. Deploy IPv6-specific intrusion detection/prevention systems (IDS/IPS) capable of identifying SLAAC spoofing attempts. 2) Employ Secure Neighbor Discovery (SEND) protocol where possible to cryptographically validate IPv6 router advertisements and prevent spoofing. 3) Enforce strict network segmentation and micro-segmentation to limit lateral movement opportunities within internal networks. 4) Validate software update sources cryptographically by enforcing code signing and using secure update mechanisms (e.g., HTTPS with certificate pinning) to prevent redirection to malicious servers. 5) Monitor DNS traffic for signs of hijacking or manipulation, and implement DNS security extensions (DNSSEC) to protect DNS integrity. 6) Conduct regular threat hunting exercises focused on detecting backdoors like WizardNet and anomalous network behaviors indicative of AiTM attacks. 7) Educate IT and security teams on IPv6-specific threats and ensure patching and configuration management include IPv6 components. 8) Collaborate with software vendors to verify update delivery mechanisms and report suspicious update behaviors promptly. These measures, combined with a proactive threat intelligence program, will help reduce the risk and impact of TheWizards’ attack techniques.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium
Indicators of Compromise
- hash: 186cfff47ba0a69ad79d46d9c187aa04
- hash: 0cba19b19df9e2c5ebe55d9de377d26a1a51b70a
- hash: 1a8147050af6f05dea5fbca1ae1ff2ffd2b68f9c
- hash: 2d376adf44dbd9cf5db08884e76192d0bc9984c4
- hash: 4db38a097ae4d5e70b2f51a8ee13b0c1ee01a2a1
- hash: 5b70a853d8e989ad102d639fbf7636b697313abc
- hash: 76953e949ac54be8ff3a68794ef1419e9ef9afcb
- hash: 9784a1483b4586eb12d86e549d39ca4bb63871b8
- hash: da867188937698c7769861c72f5490cb9c3d4f63
- hash: b8ef1b0af5bf25a1736ef139e56c078c65ce025d3bfbfa156a4b20ba1b2aa74d
- domain: assetsqq.com
- domain: mkdmcdn.com
- domain: plugin-audiofirstpiece.ml
- domain: vv.ssl-dns.com
- hash: a961766c1b2e5133d589be1cf47e3338
- hash: da73153c76b6f652f9b2847531d1c367
- domain: ssl-dns.com
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
Description
TheWizards, a China-aligned APT group, employs Spellbinder, a lateral movement tool for adversary-in-the-middle attacks through IPv6 SLAAC spoofing. This technique allows them to intercept network traffic and redirect legitimate Chinese software updates to malicious servers. The group targets individuals, gambling companies, and entities in Southeast Asia, UAE, China, and Hong Kong. Their malware chain includes the WizardNet backdoor and utilizes DNS hijacking to deliver malicious updates. Evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting it may be a digital quartermaster for this APT group. The attackers use sophisticated tools and techniques to evade detection and maintain persistence on compromised systems.
AI-Powered Analysis
Technical Analysis
TheWizards is a China-aligned advanced persistent threat (APT) group that has been observed employing a sophisticated attack technique involving IPv6 SLAAC (Stateless Address Autoconfiguration) spoofing to conduct adversary-in-the-middle (AiTM) attacks. Their toolset includes Spellbinder, which facilitates lateral movement within compromised networks by exploiting IPv6 network configuration protocols. By spoofing SLAAC messages, TheWizards can manipulate network traffic flows, intercepting and redirecting legitimate software update requests—specifically targeting Chinese software updates—to malicious servers under their control. This redirection enables the delivery of malicious payloads disguised as legitimate updates, thereby compromising targeted systems without raising immediate suspicion. The malware chain used by TheWizards includes the WizardNet backdoor, which provides persistent remote access and control over infected hosts. Additionally, the group leverages DNS hijacking techniques to further ensure the delivery of malicious updates and maintain control over network communications. The campaign targets individuals and organizations primarily in Southeast Asia, the UAE, China, and Hong Kong, with a focus on gambling companies among other entities. Attribution evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting a possible front or digital quartermaster role supporting the group’s operations. The attackers demonstrate advanced operational security and evasion capabilities, making detection and mitigation challenging. This attack vector is notable for exploiting IPv6 network protocols, which are increasingly deployed but often less monitored than IPv4, thereby expanding the attack surface for lateral movement and network traffic interception.
Potential Impact
For European organizations, the threat posed by TheWizards’ SLAAC spoofing and adversary-in-the-middle attacks could be significant, especially for entities that rely on IPv6 infrastructure or have business relationships with Chinese software vendors. The interception and redirection of software updates could lead to the installation of backdoors like WizardNet, enabling long-term espionage, data exfiltration, and potential disruption of critical services. Organizations in sectors such as gambling, finance, telecommunications, and any with supply chain dependencies involving Chinese software are at heightened risk. The stealthy nature of the attack, combined with the use of DNS hijacking and lateral movement tools, increases the likelihood of persistent compromise and lateral spread within networks. This could result in intellectual property theft, regulatory non-compliance due to data breaches, and operational disruptions. Moreover, the exploitation of IPv6 SLAAC spoofing highlights a relatively under-monitored attack vector that could bypass traditional IPv4-centric security controls common in many European enterprises. Given the geopolitical tensions and the strategic importance of cybersecurity in Europe, such attacks could also have broader implications for national security and critical infrastructure protection.
Mitigation Recommendations
European organizations should implement several targeted measures to mitigate this threat beyond generic best practices: 1) Enhance IPv6 network monitoring and logging to detect anomalous SLAAC messages and unauthorized router advertisements. Deploy IPv6-specific intrusion detection/prevention systems (IDS/IPS) capable of identifying SLAAC spoofing attempts. 2) Employ Secure Neighbor Discovery (SEND) protocol where possible to cryptographically validate IPv6 router advertisements and prevent spoofing. 3) Enforce strict network segmentation and micro-segmentation to limit lateral movement opportunities within internal networks. 4) Validate software update sources cryptographically by enforcing code signing and using secure update mechanisms (e.g., HTTPS with certificate pinning) to prevent redirection to malicious servers. 5) Monitor DNS traffic for signs of hijacking or manipulation, and implement DNS security extensions (DNSSEC) to protect DNS integrity. 6) Conduct regular threat hunting exercises focused on detecting backdoors like WizardNet and anomalous network behaviors indicative of AiTM attacks. 7) Educate IT and security teams on IPv6-specific threats and ensure patching and configuration management include IPv6 components. 8) Collaborate with software vendors to verify update delivery mechanisms and report suspicious update behaviors promptly. These measures, combined with a proactive threat intelligence program, will help reduce the risk and impact of TheWizards’ attack techniques.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks"]
- Adversary
- TheWizards
- Pulse Id
- 68124373bde0da2a4679b021
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash186cfff47ba0a69ad79d46d9c187aa04 | — | |
hash0cba19b19df9e2c5ebe55d9de377d26a1a51b70a | — | |
hash1a8147050af6f05dea5fbca1ae1ff2ffd2b68f9c | — | |
hash2d376adf44dbd9cf5db08884e76192d0bc9984c4 | — | |
hash4db38a097ae4d5e70b2f51a8ee13b0c1ee01a2a1 | — | |
hash5b70a853d8e989ad102d639fbf7636b697313abc | — | |
hash76953e949ac54be8ff3a68794ef1419e9ef9afcb | — | |
hash9784a1483b4586eb12d86e549d39ca4bb63871b8 | — | |
hashda867188937698c7769861c72f5490cb9c3d4f63 | — | |
hashb8ef1b0af5bf25a1736ef139e56c078c65ce025d3bfbfa156a4b20ba1b2aa74d | — | |
hasha961766c1b2e5133d589be1cf47e3338 | — | |
hashda73153c76b6f652f9b2847531d1c367 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainassetsqq.com | — | |
domainmkdmcdn.com | — | |
domainplugin-audiofirstpiece.ml | — | |
domainvv.ssl-dns.com | — | |
domainssl-dns.com | — |
Threat ID: 6839cb0b182aa0cae2b532cd
Added to database: 5/30/2025, 3:13:15 PM
Last enriched: 7/2/2025, 12:25:22 AM
Last updated: 11/22/2025, 6:03:29 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
New Tools and Techniques of ToddyCat APT
MediumAnalysis of APT-C-26 (Lazarus) Group's Attack Campaign Using Remote IT Disguise to Deploy Monitoring Software
MediumIt's not personal, it's just business
MediumWhatsApp compromise leads to Astaroth deployment
MediumNKNShell Malware Distributed via VPN Website
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.