Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Cyberattack Targets Southeast Asian Military

China-Linked Cyberattack Targets Southeast Asian Military

Posted on March 25, 2026 By CWS

A cyber espionage operation, identified as CL-STA-1087, has systematically targeted military networks across Southeast Asia since 2020. This operation is believed to be associated with a threat entity linked to China, focusing less on mass data theft and more on acquiring strategic intelligence.

Operation Tactics and Initial Exposure

The campaign’s stealth was compromised when endpoint security systems detected unusual PowerShell activities within a military network. Investigations revealed the attackers had already established a presence, employing scripts that communicated with multiple command-and-control servers. These scripts were intentionally programmed to pause for six hours between actions to elude detection tools.

PolySwarm analysts identified a key component of the operation, the AppleChris backdoor, confirming its role in the espionage activities. After a brief period of dormancy, the attackers resumed operations, using sophisticated tactics to infiltrate deeper into the network through lateral movement.

Tools and Techniques of the Attackers

Palo Alto’s Unit 42 provided further insights into the campaign’s complexity. The attackers employed three principal tools: AppleChris, MemFun, and a modified version of the credential-stealing tool Mimikatz, known as Getpass. The operation’s timing and infrastructure suggested a strong connection to China, as evidenced by their use of China-based cloud services and Simplified Chinese language elements.

To maintain a persistent presence, the attackers created new Windows services and executed DLL hijacking, cleverly disguising their operations within legitimate system processes.

Backdoor Mechanisms and Credential Theft

The AppleChris backdoor utilized a Dead Drop Resolver technique, retrieving encrypted server addresses from services like Pastebin or Dropbox, making detection difficult. MemFun, another backdoor, operated entirely in memory, further complicating detection efforts. Its infection process began with a disguised file named GoogleUpdate.exe, launching an in-memory downloader.

Getpass specialized in extracting sensitive credentials by accessing the lsass.exe process. Unlike typical Mimikatz uses, this variant operated silently, storing collected data in a file mimicking a legitimate Windows system file.

Military organizations are advised to enhance monitoring of PowerShell and WMI activities and implement stringent controls on DLL usage and LSASS access to mitigate such threats.

For continuous updates on cybersecurity news, follow us on Google News, LinkedIn, and X.

Cyber Security News Tags:AppleChris, China, CL-STA-1087, Cyberattack, Cybersecurity, digital security, Espionage, Getpass, Hacking, MemFun, Military, Palo Alto, Southeast Asia, threat actor, Unit 42

Post navigation

Previous Post: SmartApeSG Campaign Exploits ClickFix for Malware Spread
Next Post: Stealthy Malware Campaign Utilizes VBS and Remote Trojans

Related Posts

Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Cyber Security News
Critical Zero-Day Flaws in PDF Software Risk Data Exposure Critical Zero-Day Flaws in PDF Software Risk Data Exposure Cyber Security News
First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology Cyber Security News
SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed Cyber Security News
Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation Cyber Security News
New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Stealthy Malware Campaign Utilizes VBS and Remote Trojans
  • China-Linked Cyberattack Targets Southeast Asian Military
  • SmartApeSG Campaign Exploits ClickFix for Malware Spread
  • Pay2Key Linux Ransomware Targets Servers and Cloud Systems
  • RSAC 2026: Key Updates and Announcements from Day Two

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Stealthy Malware Campaign Utilizes VBS and Remote Trojans
  • China-Linked Cyberattack Targets Southeast Asian Military
  • SmartApeSG Campaign Exploits ClickFix for Malware Spread
  • Pay2Key Linux Ransomware Targets Servers and Cloud Systems
  • RSAC 2026: Key Updates and Announcements from Day Two

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark