Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Cyberattack Targets Southeast Asian Military

China-Linked Cyberattack Targets Southeast Asian Military

Posted on March 25, 2026 By CWS

A cyber espionage operation, identified as CL-STA-1087, has systematically targeted military networks across Southeast Asia since 2020. This operation is believed to be associated with a threat entity linked to China, focusing less on mass data theft and more on acquiring strategic intelligence.

Operation Tactics and Initial Exposure

The campaign’s stealth was compromised when endpoint security systems detected unusual PowerShell activities within a military network. Investigations revealed the attackers had already established a presence, employing scripts that communicated with multiple command-and-control servers. These scripts were intentionally programmed to pause for six hours between actions to elude detection tools.

PolySwarm analysts identified a key component of the operation, the AppleChris backdoor, confirming its role in the espionage activities. After a brief period of dormancy, the attackers resumed operations, using sophisticated tactics to infiltrate deeper into the network through lateral movement.

Tools and Techniques of the Attackers

Palo Alto’s Unit 42 provided further insights into the campaign’s complexity. The attackers employed three principal tools: AppleChris, MemFun, and a modified version of the credential-stealing tool Mimikatz, known as Getpass. The operation’s timing and infrastructure suggested a strong connection to China, as evidenced by their use of China-based cloud services and Simplified Chinese language elements.

To maintain a persistent presence, the attackers created new Windows services and executed DLL hijacking, cleverly disguising their operations within legitimate system processes.

Backdoor Mechanisms and Credential Theft

The AppleChris backdoor utilized a Dead Drop Resolver technique, retrieving encrypted server addresses from services like Pastebin or Dropbox, making detection difficult. MemFun, another backdoor, operated entirely in memory, further complicating detection efforts. Its infection process began with a disguised file named GoogleUpdate.exe, launching an in-memory downloader.

Getpass specialized in extracting sensitive credentials by accessing the lsass.exe process. Unlike typical Mimikatz uses, this variant operated silently, storing collected data in a file mimicking a legitimate Windows system file.

Military organizations are advised to enhance monitoring of PowerShell and WMI activities and implement stringent controls on DLL usage and LSASS access to mitigate such threats.

For continuous updates on cybersecurity news, follow us on Google News, LinkedIn, and X.

Cyber Security News Tags:AppleChris, China, CL-STA-1087, Cyberattack, Cybersecurity, digital security, Espionage, Getpass, Hacking, MemFun, Military, Palo Alto, Southeast Asia, threat actor, Unit 42

Post navigation

Previous Post: SmartApeSG Campaign Exploits ClickFix for Malware Spread
Next Post: Stealthy Malware Campaign Utilizes VBS and Remote Trojans

Related Posts

Cybersecurity News Weekly Newsletter – Android and Cisco 0-Day, Teams Flaws, HackedGPT, and Whisper Leak Cybersecurity News Weekly Newsletter – Android and Cisco 0-Day, Teams Flaws, HackedGPT, and Whisper Leak Cyber Security News
WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution Cyber Security News
Adobe Fixes Critical Acrobat Reader Security Flaw Adobe Fixes Critical Acrobat Reader Security Flaw Cyber Security News
RoadK1ll Malware Threatens Network Security with Stealthy Relays RoadK1ll Malware Threatens Network Security with Stealthy Relays Cyber Security News
SolarWinds Releases Advisory on Salesloft Drift Security Incident SolarWinds Releases Advisory on Salesloft Drift Security Incident Cyber Security News
Beware of Fake WinRAR Website That Delivers Malware with WinRAR Installer Beware of Fake WinRAR Website That Delivers Malware with WinRAR Installer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Urgent: cPanel and WHM Security Updates Released
  • TCLBANKER Trojan Expands Through WhatsApp and Outlook
  • Critical Microsoft 365 Copilot Flaws Resolved by Microsoft
  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark