Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Group Targets Exchange Servers with Malware

China-Linked Group Targets Exchange Servers with Malware

Posted on May 5, 2026 By CWS

A cyber threat group known as SHADOW-EARTH-053, believed to be aligned with China, has been exploiting vulnerabilities in Microsoft Exchange Servers. This group has primarily targeted government and defense-related entities across Asia, leading to significant concerns about cyberespionage activities.

Global Impact and Targeted Regions

Since at least December 2024, SHADOW-EARTH-053 has directed its efforts towards multiple countries. Their targets include government ministries, defense contractors, IT firms, and transportation organizations in South, East, and Southeast Asia. Notably, the group extended its reach to Europe, targeting Poland, thus indicating a broader strategy beyond Asia.

Trend Micro analysts, Daniel Lunghi and Lucas Silva, have been monitoring these campaigns. They identified the connections between SHADOW-EARTH-053’s activities and China’s strategic interests, marking a significant overlap with another group, SHADOW-EARTH-054. Both groups share similar techniques and tools, indicating a coordinated approach.

Exploitation of Known Vulnerabilities

The group’s primary method involves exploiting unpatched vulnerabilities in Microsoft’s Exchange and Internet Information Services (IIS) servers. Notably, they utilized the ProxyLogon vulnerabilities, identified as CVE-2021-26855 and others. Despite being older vulnerabilities, they remain potent due to unpatched systems, risking data breaches and prolonged unauthorized access.

SHADOW-EARTH-053’s attacks have had a profound impact, compromising numerous organizations. Their tactics include installing Exchange server snap-ins to access and export sensitive email data using custom tools. Such methods echo previous cyber operations attributed to Hafnium, a known threat actor.

ShadowPad Malware and Attack Strategies

The group primarily employs ShadowPad malware, a sophisticated implant first used by APT41. The variant used by SHADOW-EARTH-053 lacks some advanced features, suggesting limited access to the latest builder versions. Their deployment strategy involves a three-file loading mechanism leveraging DLL sideloading, with executables signed by reputable vendors to evade detection.

A notable tactic includes using a legitimate Toshiba Bluetooth executable to sideload malicious components. This approach underscores the need for vigilant monitoring of registry activities and executable behavior.

Preventive Measures for Organizations

Organizations with exposed Microsoft Exchange or IIS servers should prioritize applying security patches and updates. When immediate patching isn’t feasible, deploying Intrusion Prevention Systems or Web Application Firewalls can help mitigate exploit attempts.

Implementing strict File Integrity Monitoring on critical directories and limiting IIS process privileges are crucial steps. Organizations should also maintain application whitelisting and monitor for unauthorized binary executions. Alerts for suspicious IIS process activities can act as early warnings of potential breaches.

By taking these proactive measures, organizations can better safeguard against the persistent threat posed by groups like SHADOW-EARTH-053.

Cyber Security News Tags:APT41, China, cyber attacks, cyberespionage, Cybersecurity, Exchange servers, Malware, Patch vulnerabilities, Shadow-Earth-053, ShadowPad, Trend Micro

Post navigation

Previous Post: ScarCruft Exploits Gaming Platform with Backdoor Attacks
Next Post: Silver Fox Exploits Fake Tax Emails for Malware Attack

Related Posts

SAP npm Packages Exploited in Major Credential Theft SAP npm Packages Exploited in Major Credential Theft Cyber Security News
GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability Cyber Security News
Enhancing Security: The Role of Threat Intelligence Enhancing Security: The Role of Threat Intelligence Cyber Security News
10 Best AI penetration Testing Companies in 2025 10 Best AI penetration Testing Companies in 2025 Cyber Security News
Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America Cyber Security News
Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cerberus Stalkerware Exploits Google Play with Firebase
  • LuxSci Introduces HIPAA-Compliant Email Solution
  • Silver Fox Exploits Fake Tax Emails for Malware Attack
  • China-Linked Group Targets Exchange Servers with Malware
  • ScarCruft Exploits Gaming Platform with Backdoor Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cerberus Stalkerware Exploits Google Play with Firebase
  • LuxSci Introduces HIPAA-Compliant Email Solution
  • Silver Fox Exploits Fake Tax Emails for Malware Attack
  • China-Linked Group Targets Exchange Servers with Malware
  • ScarCruft Exploits Gaming Platform with Backdoor Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark