Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

Posted on October 15, 2025October 15, 2025 By CWS

A risk actor with ties to China has been attributed to a five-month-long intrusion focusing on a Russian IT service supplier, marking the hacking group’s growth to the nation past Southeast Asia and South America.
The exercise, which befell from January to Could 2025, has been attributed by Broadcom-owned Symantec to a risk actor it tracks as Jewelbug, which it stated overlaps with clusters referred to as CL-STA-0049 (Palo Alto Networks Unit 42), Earth Alux (Development Micro), and REF7707 (Elastic Safety Labs).
The findings counsel Russia just isn’t off-limits for Chinese language cyber espionage operations regardless of elevated “navy, financial, and diplomatic” relations between Moscow and Beijing over time.
“Attackers had entry to code repositories and software program construct methods that they might probably leverage to hold out provide chain assaults focusing on the corporate’s clients in Russia,” the Symantec Menace Hunter Crew stated in a report shared with The Hacker Information. “Notably too, the attackers had been exfiltrating knowledge to Yandex Cloud.”

Earth Alux is assessed to be energetic since no less than the second quarter of 2023, with assaults primarily focusing on authorities, know-how, logistics, manufacturing, telecommunications, IT providers, and retail within the Asia-Pacific (APAC) and Latin American (LATAM) areas to ship malware like VARGEIT and COBEACON (aka Cobalt Strike Beacon).
The assaults mounted by CL-STA-0049/REF7707, however, have been noticed distributing a complicated backdoor named FINALDRAFT (aka Squidoor) that is able to infecting each Home windows and Linux methods. The findings from Symantec mark the primary time these two exercise clusters have been tied collectively.
Within the assault aimed on the Russian IT service supplier, Jewelbug is claimed to have leveraged a renamed model of Microsoft Console Debugger (“cdb.exe”), which can be utilized to run shellcode and bypass utility allowlisting, in addition to launch executables, run DLLs, and terminate safety options.
The risk actor has additionally been noticed dumping credentials, establishing persistence by way of scheduled duties, and trying to hide traces of their exercise by clearing Home windows Occasion Logs.
The focusing on of IT service suppliers is strategic because it opens the door to doable provide chain assaults, enabling risk actors to leverage the compromise to breach a number of downstream clients directly by way of malicious software program updates.

Moreover, Jewelbug has additionally been linked to an intrusion at a big South American authorities group in July 2025, deploying a beforehand undocumented backdoor that is stated to be beneath improvement – underscoring the group’s evolving capabilities. The malware makes use of Microsoft Graph API and OneDrive for command-and-control (C2), and might accumulate system info, enumerate information from focused machines, and add the knowledge to OneDrive.
The usage of Microsoft Graph API permits the risk actor to mix in with regular community visitors and leaves minimal forensic artifacts, complicating post-incident evaluation and prolonging dwell time for risk actors.
Different targets embrace an IT supplier primarily based in South Asia and a Taiwanese firm in October and November 2024, with the assault on the latter leveraging DLL side-loading strategies to drop malicious payloads, together with ShadowPad, a backdoor completely utilized by Chinese language hacking teams.
The an infection chain can be characterised by the deployment of the KillAV instrument to disable safety software program and a publicly out there instrument named EchoDrv, which allows abuse of the kernel learn/write vulnerability within the ECHOAC anti-cheat driver, as a part of what seems to be a convey your individual weak driver (BYOVD) assault.

Additionally leveraged had been LSASS and Mimikatz for dumping credentials, freely out there instruments like PrintNotifyPotato, Coerced Potato, and Candy Potato for discovery and privilege escalation, and a SOCKS tunneling utility dubbed EarthWorm that has been utilized by Chinese language hacking crews like Gelsemium and Fortunate Mouse.
“Jewelbug’s choice for utilizing cloud providers and different reliable instruments in its operations signifies that remaining beneath the radar and establishing a stealthy and protracted presence on sufferer networks is of utmost significance to this group,” Symantec stated.
The disclosure comes as Taiwan’s Nationwide Safety Bureau warned of an increase in Chinese language cyber assaults focusing on its authorities departments, and referred to as out Beijing’s “on-line troll military” for trying to disseminate fabricated content material throughout social networks and undermine individuals’s belief within the authorities and sow mistrust within the U.S., Reuters reported.

The Hacker News Tags:Chinese, Group, Infiltrated, Jewelbug, Months, Network, Quietly, Russian, Threat

Post navigation

Previous Post: SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta
Next Post: New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands

Related Posts

Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails The Hacker News
Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues The Hacker News
Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware The Hacker News
CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center The Hacker News
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin The Hacker News
Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How SOCs Detect More Threats without Alert Overload
  • Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data
  • Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025
  • New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands
  • Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How SOCs Detect More Threats without Alert Overload
  • Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data
  • Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025
  • New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands
  • Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News