Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Cyberattack Targets Southeast Asian Military

China-Linked Cyberattack Targets Southeast Asian Military

Posted on March 25, 2026 By CWS

A cyber espionage operation, identified as CL-STA-1087, has systematically targeted military networks across Southeast Asia since 2020. This operation is believed to be associated with a threat entity linked to China, focusing less on mass data theft and more on acquiring strategic intelligence.

Operation Tactics and Initial Exposure

The campaign’s stealth was compromised when endpoint security systems detected unusual PowerShell activities within a military network. Investigations revealed the attackers had already established a presence, employing scripts that communicated with multiple command-and-control servers. These scripts were intentionally programmed to pause for six hours between actions to elude detection tools.

PolySwarm analysts identified a key component of the operation, the AppleChris backdoor, confirming its role in the espionage activities. After a brief period of dormancy, the attackers resumed operations, using sophisticated tactics to infiltrate deeper into the network through lateral movement.

Tools and Techniques of the Attackers

Palo Alto’s Unit 42 provided further insights into the campaign’s complexity. The attackers employed three principal tools: AppleChris, MemFun, and a modified version of the credential-stealing tool Mimikatz, known as Getpass. The operation’s timing and infrastructure suggested a strong connection to China, as evidenced by their use of China-based cloud services and Simplified Chinese language elements.

To maintain a persistent presence, the attackers created new Windows services and executed DLL hijacking, cleverly disguising their operations within legitimate system processes.

Backdoor Mechanisms and Credential Theft

The AppleChris backdoor utilized a Dead Drop Resolver technique, retrieving encrypted server addresses from services like Pastebin or Dropbox, making detection difficult. MemFun, another backdoor, operated entirely in memory, further complicating detection efforts. Its infection process began with a disguised file named GoogleUpdate.exe, launching an in-memory downloader.

Getpass specialized in extracting sensitive credentials by accessing the lsass.exe process. Unlike typical Mimikatz uses, this variant operated silently, storing collected data in a file mimicking a legitimate Windows system file.

Military organizations are advised to enhance monitoring of PowerShell and WMI activities and implement stringent controls on DLL usage and LSASS access to mitigate such threats.

For continuous updates on cybersecurity news, follow us on Google News, LinkedIn, and X.

Cyber Security News Tags:AppleChris, China, CL-STA-1087, Cyberattack, Cybersecurity, digital security, Espionage, Getpass, Hacking, MemFun, Military, Palo Alto, Southeast Asia, threat actor, Unit 42

Post navigation

Previous Post: SmartApeSG Campaign Exploits ClickFix for Malware Spread
Next Post: Stealthy Malware Campaign Utilizes VBS and Remote Trojans

Related Posts

Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer Cyber Security News
New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild Cyber Security News
New PCPcat Exploiting React2Shell Vulnerability to compromise 59,000+ Servers New PCPcat Exploiting React2Shell Vulnerability to compromise 59,000+ Servers Cyber Security News
Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets Cyber Security News
Microsoft Azure API Management Flaw Enables Cross-Tenant Account Creation, Bypassing Admin Restrictions Microsoft Azure API Management Flaw Enables Cross-Tenant Account Creation, Bypassing Admin Restrictions Cyber Security News
Everest Ransomware Group Allegedly Claims to Have Breached McDonald’s India Everest Ransomware Group Allegedly Claims to Have Breached McDonald’s India Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List
  • Cyberattack Hits European Commission’s AWS Account
  • Windows 11 Update to Block Untrusted Kernel Drivers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TA446 Uses DarkSword Exploit in Spear-Phishing Campaign
  • CISA Flags Critical F5 BIG-IP Vulnerability Exploitation
  • Critical Flaw in Trivy Scanner Added to CISA’s Vulnerability List
  • Cyberattack Hits European Commission’s AWS Account
  • Windows 11 Update to Block Untrusted Kernel Drivers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark