In previous articles we identified Jinan Quanxin Fangyuan Technology Co. Ltd. ( 济南全欣方沅科技有限公司), Jinan Anchuang Information Technology Co. Ltd. (济南安创信息科技有限公司), Jinan Fanglang Information Technology Co. Ltd. (济南方朗信息科技有限公司) and RealSOI Computer Network Technology Co. Ltd. (瑞索计算机网络科技有限公司) as companies associated with Guo Lin (郭林), a likely MSS Officer in Jinan.
We also identified two hackers from Jinan – Wang Qingwei (王庆卫), the representative of the Jinan Fanglang company and Zeng Xiaoyong (曾小勇) the individual behind the online profile ‘envymask’.
ZoxRPC
The Chinese variant of MS08-067 is particularly interesting because it forms part of a hacking tool frequently used by Chinese APT groups called ZoxRPC. This report from Novetta details ZoxRPC’s incorporation in its code of specific memory addresses from the port of MS08-067 to Chinese operating systems (for which envymask takes responsibility).
That is to say, Zeng’s code is used in ZoxRPC.

If there were any doubt that it was envymask’s code used in ZoxRPC, have a look at the code found on pudn[.]com and you will see that it says: ‘MS08-067 Exploit for CN by EMM@ph4nt0m.org’.

ZoxPNG
In a timeline analysis, the Novetta report identifies that ZoxRPC was evolved from code dating back to 2002 and was eventually released in 2008. It was then further developed into a new tool called ZoxPNG in 2013.

A PwC presentation given at the Kaspersky Security Analyst Summit in 2015 showed that Chinese hacker Zhang Peng (张鹏) aka ‘missll’ was the author of the newer ZoxPNG variant.

APT17
As FireEye noted in their ‘Hide and Seek’ report, ZoxPNG is also known as BLACKCOFFEE. And as V3 showed in their blog article, APT17 aka DeputyDog used BLACKCOFFEE malware as a key part of multiple campaigns.

So Zeng wrote the MS08-067 code in ZoxRPC.
And Zhang Peng aka missll evolved it into the APT17 tool ZoxPNG aka BLACKCOFFEE.
Where was Zhang Peng from? Jinan, China.

In summary:
Either, one of the authors of code in APT17’s primary malware just happens to be associated with a series of Cyber Security outfits that claim the MSS as their clients and are coincidentally managed by an MSS Officer.
Or, MSS Officer Guo Lin of the Jinan bureau of the Ministry of State Security manages APT17.
#thereismore…
14 thoughts on “APT17 is run by the Jinan bureau of the Chinese Ministry of State Security”
Comments are closed.