Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Silver Dragon Uses Google Drive in Cyberattacks

China-Linked Silver Dragon Uses Google Drive in Cyberattacks

Posted on March 4, 2026 By CWS

A cyber threat group known as Silver Dragon, with ties to China, has been actively targeting governmental and prominent organizations in Southeast Asia and Europe since mid-2024. Operating as part of the APT41 group, this entity utilizes sophisticated methods to infiltrate systems and gather sensitive information.

Infiltration Tactics and Techniques

Silver Dragon employs a strategic approach to breaching targeted systems. The group exploits vulnerabilities in publicly accessible internet servers and sends phishing emails containing harmful attachments. Once a system is compromised, they deploy Cobalt Strike beacons to establish control over the infected devices.

To communicate commands, Silver Dragon uses DNS tunneling, cleverly disguising their activities within regular network traffic to evade detection. This method, combined with their use of commercial tools, complicates early identification by security defenders.

Distinct Infection Chains

Analysts from Check Point have identified three separate infection chains utilized by Silver Dragon, all leading to the deployment of Cobalt Strike. One chain manipulates AppDomain hijacking, using malicious configuration files to execute alongside legitimate Windows binaries, ensuring persistence.

Another technique involves registering malicious DLLs as Windows services, under names like Bluetooth Update. Additionally, phishing emails with weaponized LNK attachments have been directed at government bodies in Uzbekistan, masquerading as official correspondence.

Advanced Tools and Techniques

Beyond Cobalt Strike, Silver Dragon employs a suite of custom tools for ongoing exploitation. SilverScreen, for instance, captures regular screenshots, while SSHcmd facilitates command execution and file transfers over secure shell. Evidence suggests these tools, with compilation timestamps aligning with the UTC+8 timezone, further indicate a Chinese origin.

The use of Google Drive as a command-and-control channel is another hallmark of Silver Dragon’s tactics. Their tool, GearDoor, routes malicious communications through Google Drive, making them indistinguishable from legitimate traffic. This method leverages file uploads and downloads to execute commands and manage infected machines discreetly.

Recommendations for Defense

Organizations are advised to monitor cloud storage, particularly Google Drive, for unusual activity. It’s crucial to review Windows services for any entries mimicking legitimate system names and enable detection measures for AppDomain hijacking.

Increased phishing awareness training is recommended for government personnel in the targeted regions. Blocking and monitoring of identified command-and-control domains and file hashes can also enhance security measures.

Stay updated with the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Consider setting CSN as a preferred source for timely updates.

Cyber Security News Tags:AppDomain hijacking, APT group, APT41, China-linked threat, Cobalt Strike, cyber espionage, Cybersecurity, DNS tunneling, GearDoor, Google Drive, Phishing, Silver Dragon

Post navigation

Previous Post: Risks of Pirated Software in Corporate Environments
Next Post: New RFP Guide Enhances AI Governance and Security

Related Posts

Critical Flaw in Grandstream VoIP Phones Exposes Networks Critical Flaw in Grandstream VoIP Phones Exposes Networks Cyber Security News
glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks Cyber Security News
Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification Cyber Security News
OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data Cyber Security News
Freedom Mobile Data Breach Exposes Personal Information of Customers Freedom Mobile Data Breach Exposes Personal Information of Customers Cyber Security News
French Officials Raid X for Alleged Cybercrime Activities French Officials Raid X for Alleged Cybercrime Activities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Driven Malware Targets Iraqi Officials: New Threats Emerge
  • Zurich’s $11 Billion Acquisition to Dominate Cyberinsurance
  • Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits
  • VoidLink Malware Targets Kubernetes and Cloud Systems
  • LastPass Alerts Users to Phishing Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Driven Malware Targets Iraqi Officials: New Threats Emerge
  • Zurich’s $11 Billion Acquisition to Dominate Cyberinsurance
  • Coruna Exploit Kit Targets iOS 13-17.2.1 with 23 Exploits
  • VoidLink Malware Targets Kubernetes and Cloud Systems
  • LastPass Alerts Users to Phishing Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News