LAPD-Signed TLS Certificates Used in Cybercrime Attacks

LAPD-Signed TLS Certificates Used in Cybercrime Attacks

Introduction: A recent cyber campaign, identified by Security Scorecard as involving China’s “Typhoon” crews, has compromised over 1,000 devices—mainly in the U.S. and East Asia. This stealthy operation aims to establish networks for long-term access to critical infrastructure using a fake LAPD certificate to disguise its activities.

Key Details:

  • Who: Security Scorecard’s threat intelligence team.
  • What: Ongoing breaches targeting end-of-life routers, IoT devices, and more, creating an Operational Relay Box (ORB) network.
  • When: The campaign likely started in September 2023.
  • Where: Predominantly affecting the U.S. (352 victims) and regions like Japan, South Korea, Taiwan, and Hong Kong.
  • Why: To facilitate covert cyberattacks by obscuring the attackers’ actual network locations.
  • How: Attackers exploit vulnerabilities in devices, notably creating a backdoor called ShortLeash that appears to be signed by a legitimate authority, maintaining connectivity for further intrusions.

Why It Matters:

  • Enterprise Security: Compromised devices pose significant risks to operational integrity and data security.
  • Cloud Compliance: Organizations must enhance compliance measures against sophisticated threats targeting cloud and hybrid environments.
  • Automation and Performance: Deployment of automated defenses and monitoring solutions can mitigate risks by identifying anomalous behavior, such as unusual connections from residential IP addresses.

Takeaway: IT professionals should closely monitor their networks for anomalies, particularly from unmonitored devices making unexpected connections, and assess their existing security frameworks to enhance resilience against this stealthy campaign.

Call-to-Action: For more curated news and infrastructure insights, visit www.trendinfra.com.

Meena Kande

meenakande

Hey there! I’m a proud mom to a wonderful son, a coffee enthusiast ☕, and a cheerful techie who loves turning complex ideas into practical solutions. With 14 years in IT infrastructure, I specialize in VMware, Veeam, Cohesity, NetApp, VAST Data, Dell EMC, Linux, and Windows. I’m also passionate about automation using Ansible, Bash, and PowerShell. At Trendinfra, I write about the infrastructure behind AI — exploring what it really takes to support modern AI use cases. I believe in keeping things simple, useful, and just a little fun along the way

Leave a Reply

Your email address will not be published. Required fields are marked *