Skip to main content

Chinese hackers use VLC media player to launch cyberattacks

Researchers discovered that Chinese hackers have been using VLC Media Player to launch cybersecurity attacks.

The hacker group, allegedly affiliated with the Chinese government, uses the popular video player to deploy malware on the targeted computer.

A large monitor displaying a security hacking breach warning.
Stock Depot / Getty Images

These activities have been traced down to a hacker group called Cicada, which is also known by a long list of other names, such as menuPass, Stone Panda, APT10, Potassium, and Red Apollo. Cicada has been around for a long time — at least since 2006.

Recommended Videos

The malware deployed to the victims of the attack opens the door for hackers to obtain all kinds of information. It can grant knowledge on everything about the system, scour through running processes, and download files on command, only broadening the potential for misuse. Such stealth attacks are not uncommon, but this one seems to have taken place on a large scale.

This campaign, involving the popular VLC Media Player, appears to have been started for espionage purposes. According to a report by Bleeping Computer, the targets involve a wide range of entities involved in legal, governmental, or religious activities. Non-governmental organizations have also been targeted. What’s perhaps more staggering is that this activity has spread to entities across at least three continents.

Some of the targeted countries include the U.S., Hong Kong, India, Italy, and Canada. Surprisingly, only one of the victims was from Japan. Cicada group has previously targeted Japan for its cyberattacks many times in the past. Once the attackers gained access to the victim’s machine, they were able to maintain it for up to nine months.

VLC Media Player.
Image used with permission by copyright holder

Although VLC was exploited to deploy malware, Bleeping Computer says that the file itself was clean. It appears that a safe version of VLC was combined with a malicious DLL file located in the place as the export functions of the media player. This is referred to as DLL side-loading, and Cicada is not alone in using this technique to upload malware into programs that are otherwise secure.

The custom loader used by Cicada has apparently been seen in previous attacks that were also connected to the hacker team. In order to first gain access to the networks that were breached, a Microsoft Exchange server was exploited. Additionally, a WinVNC server was deployed as a means of establishing remote control over the systems affected by the hidden malware.

There’s more to the VLC exploit than first meets the eye. On top of that, an exploit called Sodamaster was used, which runs stealthily in the system memory without requiring any files. It’s capable of avoiding detection and can delay execution at startup.

The information comes from Symantec and was reported by Bleeping Computer. Symantec’s researchers discovered that these cybersecurity attacks may have started in mid-2021 and continued taking place in February 2022. However, it’s entirely possible that this threat continues to this day.

Although these attacks are certainly dangerous, it’s probable that not every user of VLC needs to worry. Bleeping Computer has stated that the VLC file in question was clean and the hackers seem to have a very targeted approach, centered on certain entities. However, it’s always important to stay on top of security where PCs are concerned.

Update 04/11/2022: We have contacted VLC and asked for an official statement on the matter. According to the developers, the program is “very safe to use,” and it has has, so far, “not been hacked or in breach of security.”

In order to avoid running into security issues, VLC recommends that all users only download the program from the official website and no other sources. In addition, it’s recommended that the program is kept updated on a regular basis.

Monica J. White
Monica is a computing writer at Digital Trends, focusing on PC hardware. Since joining the team in 2021, Monica has written…
Hackers are using fake WordPress DDoS pages to launch malware
A digital depiction of a laptop being hacked by a hacker.

Hackers are pushing the distribution of dangerous malware via WordPress websites through bogus Cloudflare distributed denial of service (DDoS) protection pages, a new report has found.

As reported by PCMag and Bleeping Computer, websites based on the WordPress format are being hacked by threat actors, with NetSupport RAT and a password-stealing trojan (RaccoonStealer) being installed if victims fall for the trick.

Read more
Hackers stole passwords from 140,000 payment terminals using malware
The Wiseasy point of sale system on a table.

An Android-based payment system has been affected by hackers who have been able to infiltrate its database and gain access to 140,000 payment terminals globally, according to TechCrunch.

The brand, Wiseasy, is well known in the Asia-Pacific region, with its payment terminals used in restaurants, hotels, retail outlets, and schools. Its accompanying Wisecloud cloud service is used for remote management and configuration for its customer's terminals.

Read more
Hackers now exploit new vulnerabilities in just 15 minutes
A depiction of a hacker breaking into a system via the use of code.

Hackers are now ​​moving faster than ever when it comes to scanning vulnerability announcements from software vendors.

Threat actors are actively scanning for vulnerable endpoints within a period of just 15 minutes once a new Common Vulnerabilities and Exposures (CVE) document is published, according to Palo Alto's 2022 Unit 42 Incident Response Report.

Read more