Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Group Targets Asian Infrastructure with ShadowPad

China-Linked Group Targets Asian Infrastructure with ShadowPad

Posted on May 1, 2026 By CWS

A China-linked cyber group, known as SHADOW-EARTH-053, has orchestrated a sophisticated espionage operation targeting government bodies and critical infrastructure across Asia. The campaign, first identified in December 2024, has affected entities in at least eight countries.

Exploiting Vulnerabilities for Initial Access

The attackers exploit unpatched vulnerabilities in Microsoft Exchange and Internet Information Services (IIS) servers to gain initial access. Particularly, the ProxyLogon vulnerability chain, comprising CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065, is targeted. Despite available patches, many organizations still operate unpatched servers, making them prime targets.

Once access is obtained, the group uses web shells like GODZILLA to establish persistent backdoors, enabling remote command execution. This stealthy approach allows them to remain undetected within the networks for extended periods.

Advanced Malware and Techniques

Trend Micro researchers Daniel Lunghi and Lucas Silva have identified the use of ShadowPad implants as a key component in this campaign. ShadowPad, a modular backdoor initially linked to APT41 and shared among China-aligned groups, is central to the attackers’ strategy. The campaign also involves IOX proxy for covert communications and Windows Management Instrumentation Command-line (WMIC) for lateral movements.

Researchers uncovered another cluster, SHADOW-EARTH-054, showing similar attack patterns and tool hashes. Nearly half of the targeted networks were compromised by both clusters, affecting countries including Pakistan, Thailand, Malaysia, India, and others.

Technical Insights into the Attack

A notable aspect of the campaign is the loading mechanism of ShadowPad via a DLL sideloading technique. Malicious DLLs are placed alongside legitimate signed executables from vendors like Toshiba, Samsung, and Microsoft. When these programs are executed, they inadvertently load the malicious DLLs.

The attackers maintain persistence through a scheduled task named “M1onltor,” which runs the sideloaded binary with elevated privileges. WMIC is then employed to deploy additional backdoors, and tools like Mimikatz are used to harvest credentials.

Defensive Measures and Future Outlook

Organizations using Microsoft Exchange or IIS servers are urged to apply the latest security patches promptly. If immediate patching is not feasible, implementing Intrusion Prevention Systems (IPS) or Web Application Firewalls (WAF) with virtual patching rules is advised. Security teams should monitor critical web directories for unauthorized changes and review EDR telemetry for suspicious activities.

Constant vigilance and proactive measures are crucial in mitigating the risks posed by such sophisticated cyber threats. As cyber espionage tactics evolve, organizations must remain agile in their defense strategies to safeguard against future attacks.

Cyber Security News Tags:APT41, Asia, China-linked group, cyber espionage, cyber threats, cyberattack mitigation, Cybersecurity, DLL Sideloading, IOX proxy, Malware, Microsoft Exchange vulnerabilities, ProxyLogon, ShadowPad, Trend Micro, WMIC

Post navigation

Previous Post: FBI Highlights Surge in Cyber Cargo Theft
Next Post: Malware Distribution Exploits AI Platforms Hugging Face, ClawHub

Related Posts

Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges Cyber Security News
Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts Cyber Security News
New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model New Analysis Uncovers LockBit 5.0 Key Capabilities and Two-Stage Execution Model Cyber Security News
Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location Cyber Security News
Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS Cyber Security News
New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cisco Introduces Open Source AI Provenance Tool
  • Malicious Ruby and Go Modules Target CI Environments
  • Fake CAPTCHA Scam Inflates Phone Bills via SMS Fraud
  • Malware Distribution Exploits AI Platforms Hugging Face, ClawHub
  • China-Linked Group Targets Asian Infrastructure with ShadowPad

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cisco Introduces Open Source AI Provenance Tool
  • Malicious Ruby and Go Modules Target CI Environments
  • Fake CAPTCHA Scam Inflates Phone Bills via SMS Fraud
  • Malware Distribution Exploits AI Platforms Hugging Face, ClawHub
  • China-Linked Group Targets Asian Infrastructure with ShadowPad

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark