Skip to main content

TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks

Medium
Published: Wed Apr 30 2025 (04/30/2025, 15:36:19 UTC)
Source: AlienVault OTX General

Description

TheWizards, a China-aligned APT group, employs Spellbinder, a lateral movement tool for adversary-in-the-middle attacks through IPv6 SLAAC spoofing. This technique allows them to intercept network traffic and redirect legitimate Chinese software updates to malicious servers. The group targets individuals, gambling companies, and entities in Southeast Asia, UAE, China, and Hong Kong. Their malware chain includes the WizardNet backdoor and utilizes DNS hijacking to deliver malicious updates. Evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting it may be a digital quartermaster for this APT group. The attackers use sophisticated tools and techniques to evade detection and maintain persistence on compromised systems.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:25:22 UTC

Technical Analysis

TheWizards is a China-aligned advanced persistent threat (APT) group that has been observed employing a sophisticated attack technique involving IPv6 SLAAC (Stateless Address Autoconfiguration) spoofing to conduct adversary-in-the-middle (AiTM) attacks. Their toolset includes Spellbinder, which facilitates lateral movement within compromised networks by exploiting IPv6 network configuration protocols. By spoofing SLAAC messages, TheWizards can manipulate network traffic flows, intercepting and redirecting legitimate software update requests—specifically targeting Chinese software updates—to malicious servers under their control. This redirection enables the delivery of malicious payloads disguised as legitimate updates, thereby compromising targeted systems without raising immediate suspicion. The malware chain used by TheWizards includes the WizardNet backdoor, which provides persistent remote access and control over infected hosts. Additionally, the group leverages DNS hijacking techniques to further ensure the delivery of malicious updates and maintain control over network communications. The campaign targets individuals and organizations primarily in Southeast Asia, the UAE, China, and Hong Kong, with a focus on gambling companies among other entities. Attribution evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting a possible front or digital quartermaster role supporting the group’s operations. The attackers demonstrate advanced operational security and evasion capabilities, making detection and mitigation challenging. This attack vector is notable for exploiting IPv6 network protocols, which are increasingly deployed but often less monitored than IPv4, thereby expanding the attack surface for lateral movement and network traffic interception.

Potential Impact

For European organizations, the threat posed by TheWizards’ SLAAC spoofing and adversary-in-the-middle attacks could be significant, especially for entities that rely on IPv6 infrastructure or have business relationships with Chinese software vendors. The interception and redirection of software updates could lead to the installation of backdoors like WizardNet, enabling long-term espionage, data exfiltration, and potential disruption of critical services. Organizations in sectors such as gambling, finance, telecommunications, and any with supply chain dependencies involving Chinese software are at heightened risk. The stealthy nature of the attack, combined with the use of DNS hijacking and lateral movement tools, increases the likelihood of persistent compromise and lateral spread within networks. This could result in intellectual property theft, regulatory non-compliance due to data breaches, and operational disruptions. Moreover, the exploitation of IPv6 SLAAC spoofing highlights a relatively under-monitored attack vector that could bypass traditional IPv4-centric security controls common in many European enterprises. Given the geopolitical tensions and the strategic importance of cybersecurity in Europe, such attacks could also have broader implications for national security and critical infrastructure protection.

Mitigation Recommendations

European organizations should implement several targeted measures to mitigate this threat beyond generic best practices: 1) Enhance IPv6 network monitoring and logging to detect anomalous SLAAC messages and unauthorized router advertisements. Deploy IPv6-specific intrusion detection/prevention systems (IDS/IPS) capable of identifying SLAAC spoofing attempts. 2) Employ Secure Neighbor Discovery (SEND) protocol where possible to cryptographically validate IPv6 router advertisements and prevent spoofing. 3) Enforce strict network segmentation and micro-segmentation to limit lateral movement opportunities within internal networks. 4) Validate software update sources cryptographically by enforcing code signing and using secure update mechanisms (e.g., HTTPS with certificate pinning) to prevent redirection to malicious servers. 5) Monitor DNS traffic for signs of hijacking or manipulation, and implement DNS security extensions (DNSSEC) to protect DNS integrity. 6) Conduct regular threat hunting exercises focused on detecting backdoors like WizardNet and anomalous network behaviors indicative of AiTM attacks. 7) Educate IT and security teams on IPv6-specific threats and ensure patching and configuration management include IPv6 components. 8) Collaborate with software vendors to verify update delivery mechanisms and report suspicious update behaviors promptly. These measures, combined with a proactive threat intelligence program, will help reduce the risk and impact of TheWizards’ attack techniques.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks"]
Adversary
TheWizards
Pulse Id
68124373bde0da2a4679b021
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash186cfff47ba0a69ad79d46d9c187aa04
hash0cba19b19df9e2c5ebe55d9de377d26a1a51b70a
hash1a8147050af6f05dea5fbca1ae1ff2ffd2b68f9c
hash2d376adf44dbd9cf5db08884e76192d0bc9984c4
hash4db38a097ae4d5e70b2f51a8ee13b0c1ee01a2a1
hash5b70a853d8e989ad102d639fbf7636b697313abc
hash76953e949ac54be8ff3a68794ef1419e9ef9afcb
hash9784a1483b4586eb12d86e549d39ca4bb63871b8
hashda867188937698c7769861c72f5490cb9c3d4f63
hashb8ef1b0af5bf25a1736ef139e56c078c65ce025d3bfbfa156a4b20ba1b2aa74d
hasha961766c1b2e5133d589be1cf47e3338
hashda73153c76b6f652f9b2847531d1c367

Domain

ValueDescriptionCopy
domainassetsqq.com
domainmkdmcdn.com
domainplugin-audiofirstpiece.ml
domainvv.ssl-dns.com
domainssl-dns.com

Threat ID: 6839cb0b182aa0cae2b532cd

Added to database: 5/30/2025, 3:13:15 PM

Last enriched: 7/2/2025, 12:25:22 AM

Last updated: 7/31/2025, 3:29:52 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats