TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
TheWizards, a China-aligned APT group, employs Spellbinder, a lateral movement tool for adversary-in-the-middle attacks through IPv6 SLAAC spoofing. This technique allows them to intercept network traffic and redirect legitimate Chinese software updates to malicious servers. The group targets individuals, gambling companies, and entities in Southeast Asia, UAE, China, and Hong Kong. Their malware chain includes the WizardNet backdoor and utilizes DNS hijacking to deliver malicious updates. Evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting it may be a digital quartermaster for this APT group. The attackers use sophisticated tools and techniques to evade detection and maintain persistence on compromised systems.
AI Analysis
Technical Summary
TheWizards is a China-aligned advanced persistent threat (APT) group that has been observed employing a sophisticated attack technique involving IPv6 SLAAC (Stateless Address Autoconfiguration) spoofing to conduct adversary-in-the-middle (AiTM) attacks. Their toolset includes Spellbinder, which facilitates lateral movement within compromised networks by exploiting IPv6 network configuration protocols. By spoofing SLAAC messages, TheWizards can manipulate network traffic flows, intercepting and redirecting legitimate software update requests—specifically targeting Chinese software updates—to malicious servers under their control. This redirection enables the delivery of malicious payloads disguised as legitimate updates, thereby compromising targeted systems without raising immediate suspicion. The malware chain used by TheWizards includes the WizardNet backdoor, which provides persistent remote access and control over infected hosts. Additionally, the group leverages DNS hijacking techniques to further ensure the delivery of malicious updates and maintain control over network communications. The campaign targets individuals and organizations primarily in Southeast Asia, the UAE, China, and Hong Kong, with a focus on gambling companies among other entities. Attribution evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting a possible front or digital quartermaster role supporting the group’s operations. The attackers demonstrate advanced operational security and evasion capabilities, making detection and mitigation challenging. This attack vector is notable for exploiting IPv6 network protocols, which are increasingly deployed but often less monitored than IPv4, thereby expanding the attack surface for lateral movement and network traffic interception.
Potential Impact
For European organizations, the threat posed by TheWizards’ SLAAC spoofing and adversary-in-the-middle attacks could be significant, especially for entities that rely on IPv6 infrastructure or have business relationships with Chinese software vendors. The interception and redirection of software updates could lead to the installation of backdoors like WizardNet, enabling long-term espionage, data exfiltration, and potential disruption of critical services. Organizations in sectors such as gambling, finance, telecommunications, and any with supply chain dependencies involving Chinese software are at heightened risk. The stealthy nature of the attack, combined with the use of DNS hijacking and lateral movement tools, increases the likelihood of persistent compromise and lateral spread within networks. This could result in intellectual property theft, regulatory non-compliance due to data breaches, and operational disruptions. Moreover, the exploitation of IPv6 SLAAC spoofing highlights a relatively under-monitored attack vector that could bypass traditional IPv4-centric security controls common in many European enterprises. Given the geopolitical tensions and the strategic importance of cybersecurity in Europe, such attacks could also have broader implications for national security and critical infrastructure protection.
Mitigation Recommendations
European organizations should implement several targeted measures to mitigate this threat beyond generic best practices: 1) Enhance IPv6 network monitoring and logging to detect anomalous SLAAC messages and unauthorized router advertisements. Deploy IPv6-specific intrusion detection/prevention systems (IDS/IPS) capable of identifying SLAAC spoofing attempts. 2) Employ Secure Neighbor Discovery (SEND) protocol where possible to cryptographically validate IPv6 router advertisements and prevent spoofing. 3) Enforce strict network segmentation and micro-segmentation to limit lateral movement opportunities within internal networks. 4) Validate software update sources cryptographically by enforcing code signing and using secure update mechanisms (e.g., HTTPS with certificate pinning) to prevent redirection to malicious servers. 5) Monitor DNS traffic for signs of hijacking or manipulation, and implement DNS security extensions (DNSSEC) to protect DNS integrity. 6) Conduct regular threat hunting exercises focused on detecting backdoors like WizardNet and anomalous network behaviors indicative of AiTM attacks. 7) Educate IT and security teams on IPv6-specific threats and ensure patching and configuration management include IPv6 components. 8) Collaborate with software vendors to verify update delivery mechanisms and report suspicious update behaviors promptly. These measures, combined with a proactive threat intelligence program, will help reduce the risk and impact of TheWizards’ attack techniques.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium
Indicators of Compromise
- hash: 186cfff47ba0a69ad79d46d9c187aa04
- hash: 0cba19b19df9e2c5ebe55d9de377d26a1a51b70a
- hash: 1a8147050af6f05dea5fbca1ae1ff2ffd2b68f9c
- hash: 2d376adf44dbd9cf5db08884e76192d0bc9984c4
- hash: 4db38a097ae4d5e70b2f51a8ee13b0c1ee01a2a1
- hash: 5b70a853d8e989ad102d639fbf7636b697313abc
- hash: 76953e949ac54be8ff3a68794ef1419e9ef9afcb
- hash: 9784a1483b4586eb12d86e549d39ca4bb63871b8
- hash: da867188937698c7769861c72f5490cb9c3d4f63
- hash: b8ef1b0af5bf25a1736ef139e56c078c65ce025d3bfbfa156a4b20ba1b2aa74d
- domain: assetsqq.com
- domain: mkdmcdn.com
- domain: plugin-audiofirstpiece.ml
- domain: vv.ssl-dns.com
- hash: a961766c1b2e5133d589be1cf47e3338
- hash: da73153c76b6f652f9b2847531d1c367
- domain: ssl-dns.com
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
Description
TheWizards, a China-aligned APT group, employs Spellbinder, a lateral movement tool for adversary-in-the-middle attacks through IPv6 SLAAC spoofing. This technique allows them to intercept network traffic and redirect legitimate Chinese software updates to malicious servers. The group targets individuals, gambling companies, and entities in Southeast Asia, UAE, China, and Hong Kong. Their malware chain includes the WizardNet backdoor and utilizes DNS hijacking to deliver malicious updates. Evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting it may be a digital quartermaster for this APT group. The attackers use sophisticated tools and techniques to evade detection and maintain persistence on compromised systems.
AI-Powered Analysis
Technical Analysis
TheWizards is a China-aligned advanced persistent threat (APT) group that has been observed employing a sophisticated attack technique involving IPv6 SLAAC (Stateless Address Autoconfiguration) spoofing to conduct adversary-in-the-middle (AiTM) attacks. Their toolset includes Spellbinder, which facilitates lateral movement within compromised networks by exploiting IPv6 network configuration protocols. By spoofing SLAAC messages, TheWizards can manipulate network traffic flows, intercepting and redirecting legitimate software update requests—specifically targeting Chinese software updates—to malicious servers under their control. This redirection enables the delivery of malicious payloads disguised as legitimate updates, thereby compromising targeted systems without raising immediate suspicion. The malware chain used by TheWizards includes the WizardNet backdoor, which provides persistent remote access and control over infected hosts. Additionally, the group leverages DNS hijacking techniques to further ensure the delivery of malicious updates and maintain control over network communications. The campaign targets individuals and organizations primarily in Southeast Asia, the UAE, China, and Hong Kong, with a focus on gambling companies among other entities. Attribution evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting a possible front or digital quartermaster role supporting the group’s operations. The attackers demonstrate advanced operational security and evasion capabilities, making detection and mitigation challenging. This attack vector is notable for exploiting IPv6 network protocols, which are increasingly deployed but often less monitored than IPv4, thereby expanding the attack surface for lateral movement and network traffic interception.
Potential Impact
For European organizations, the threat posed by TheWizards’ SLAAC spoofing and adversary-in-the-middle attacks could be significant, especially for entities that rely on IPv6 infrastructure or have business relationships with Chinese software vendors. The interception and redirection of software updates could lead to the installation of backdoors like WizardNet, enabling long-term espionage, data exfiltration, and potential disruption of critical services. Organizations in sectors such as gambling, finance, telecommunications, and any with supply chain dependencies involving Chinese software are at heightened risk. The stealthy nature of the attack, combined with the use of DNS hijacking and lateral movement tools, increases the likelihood of persistent compromise and lateral spread within networks. This could result in intellectual property theft, regulatory non-compliance due to data breaches, and operational disruptions. Moreover, the exploitation of IPv6 SLAAC spoofing highlights a relatively under-monitored attack vector that could bypass traditional IPv4-centric security controls common in many European enterprises. Given the geopolitical tensions and the strategic importance of cybersecurity in Europe, such attacks could also have broader implications for national security and critical infrastructure protection.
Mitigation Recommendations
European organizations should implement several targeted measures to mitigate this threat beyond generic best practices: 1) Enhance IPv6 network monitoring and logging to detect anomalous SLAAC messages and unauthorized router advertisements. Deploy IPv6-specific intrusion detection/prevention systems (IDS/IPS) capable of identifying SLAAC spoofing attempts. 2) Employ Secure Neighbor Discovery (SEND) protocol where possible to cryptographically validate IPv6 router advertisements and prevent spoofing. 3) Enforce strict network segmentation and micro-segmentation to limit lateral movement opportunities within internal networks. 4) Validate software update sources cryptographically by enforcing code signing and using secure update mechanisms (e.g., HTTPS with certificate pinning) to prevent redirection to malicious servers. 5) Monitor DNS traffic for signs of hijacking or manipulation, and implement DNS security extensions (DNSSEC) to protect DNS integrity. 6) Conduct regular threat hunting exercises focused on detecting backdoors like WizardNet and anomalous network behaviors indicative of AiTM attacks. 7) Educate IT and security teams on IPv6-specific threats and ensure patching and configuration management include IPv6 components. 8) Collaborate with software vendors to verify update delivery mechanisms and report suspicious update behaviors promptly. These measures, combined with a proactive threat intelligence program, will help reduce the risk and impact of TheWizards’ attack techniques.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks"]
- Adversary
- TheWizards
- Pulse Id
- 68124373bde0da2a4679b021
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash186cfff47ba0a69ad79d46d9c187aa04 | — | |
hash0cba19b19df9e2c5ebe55d9de377d26a1a51b70a | — | |
hash1a8147050af6f05dea5fbca1ae1ff2ffd2b68f9c | — | |
hash2d376adf44dbd9cf5db08884e76192d0bc9984c4 | — | |
hash4db38a097ae4d5e70b2f51a8ee13b0c1ee01a2a1 | — | |
hash5b70a853d8e989ad102d639fbf7636b697313abc | — | |
hash76953e949ac54be8ff3a68794ef1419e9ef9afcb | — | |
hash9784a1483b4586eb12d86e549d39ca4bb63871b8 | — | |
hashda867188937698c7769861c72f5490cb9c3d4f63 | — | |
hashb8ef1b0af5bf25a1736ef139e56c078c65ce025d3bfbfa156a4b20ba1b2aa74d | — | |
hasha961766c1b2e5133d589be1cf47e3338 | — | |
hashda73153c76b6f652f9b2847531d1c367 | — |
Domain
Value | Description | Copy |
---|---|---|
domainassetsqq.com | — | |
domainmkdmcdn.com | — | |
domainplugin-audiofirstpiece.ml | — | |
domainvv.ssl-dns.com | — | |
domainssl-dns.com | — |
Threat ID: 6839cb0b182aa0cae2b532cd
Added to database: 5/30/2025, 3:13:15 PM
Last enriched: 7/2/2025, 12:25:22 AM
Last updated: 7/31/2025, 3:29:52 PM
Views: 18
Related Threats
Malicious JavaScript Injects Fullscreen Iframe On a WordPress Website
MediumCoordinated Brute Force Campaign Targets Fortinet SSL VPN
MediumHow "helpful" AI assistants are accidentally destroying production systems - and what we're doing about it.
MediumNew Brute-Force Campaign Hits Fortinet SSL VPN in Coordinated Attack
Medium"Click to Allow" Robot Exposes Online Fraud Empire
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.