From thehackernews.com
![Betting Companies](https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEi4tcEohb6WyR6xNQSJ_qbPeG92AwKXJb57a1G9T-SaOVov9Pe2BezPq5zBkDZSnEGWwt1lpGzVhL80-jMsKHvlEsDATG1xytG7OeztxA7mz7UrbJVdPeIuQXAJjizSZimpxFJQZ7QVK03S9wBnCDKIQEZMnNhh06aU6LEO74OLxn05bSzzCXBIICSP/s728-e1000/casico.jpg)
A Chinese-speaking advanced persistent threat (APT) has been linked to a new campaign targeting gambling-related companies in South East Asia, particularly Taiwan, the Philippines, and Hong Kong.
Cybersecurity firm Avast dubbed the campaign Operation Dragon Castling, describing its malware arsenal as a “robust and modular toolset.” The ultimate motives of the threat actor are not immediately discernible as yet nor has it been linked to a known hacking group.
While multiple initial access avenues were employed during the course of the campaign, one of the attack vectors involved leveraging a previously unknown remote code execution flaw in the WPS Office suite (CVE-2022-24934) to backdoor its targets. The issue has since been addressed by Kingsoft Office, the developers of the office software.