Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Silver Dragon Uses Google Drive in Cyberattacks

China-Linked Silver Dragon Uses Google Drive in Cyberattacks

Posted on March 4, 2026 By CWS

A cyber threat group known as Silver Dragon, with ties to China, has been actively targeting governmental and prominent organizations in Southeast Asia and Europe since mid-2024. Operating as part of the APT41 group, this entity utilizes sophisticated methods to infiltrate systems and gather sensitive information.

Infiltration Tactics and Techniques

Silver Dragon employs a strategic approach to breaching targeted systems. The group exploits vulnerabilities in publicly accessible internet servers and sends phishing emails containing harmful attachments. Once a system is compromised, they deploy Cobalt Strike beacons to establish control over the infected devices.

To communicate commands, Silver Dragon uses DNS tunneling, cleverly disguising their activities within regular network traffic to evade detection. This method, combined with their use of commercial tools, complicates early identification by security defenders.

Distinct Infection Chains

Analysts from Check Point have identified three separate infection chains utilized by Silver Dragon, all leading to the deployment of Cobalt Strike. One chain manipulates AppDomain hijacking, using malicious configuration files to execute alongside legitimate Windows binaries, ensuring persistence.

Another technique involves registering malicious DLLs as Windows services, under names like Bluetooth Update. Additionally, phishing emails with weaponized LNK attachments have been directed at government bodies in Uzbekistan, masquerading as official correspondence.

Advanced Tools and Techniques

Beyond Cobalt Strike, Silver Dragon employs a suite of custom tools for ongoing exploitation. SilverScreen, for instance, captures regular screenshots, while SSHcmd facilitates command execution and file transfers over secure shell. Evidence suggests these tools, with compilation timestamps aligning with the UTC+8 timezone, further indicate a Chinese origin.

The use of Google Drive as a command-and-control channel is another hallmark of Silver Dragon’s tactics. Their tool, GearDoor, routes malicious communications through Google Drive, making them indistinguishable from legitimate traffic. This method leverages file uploads and downloads to execute commands and manage infected machines discreetly.

Recommendations for Defense

Organizations are advised to monitor cloud storage, particularly Google Drive, for unusual activity. It’s crucial to review Windows services for any entries mimicking legitimate system names and enable detection measures for AppDomain hijacking.

Increased phishing awareness training is recommended for government personnel in the targeted regions. Blocking and monitoring of identified command-and-control domains and file hashes can also enhance security measures.

Stay updated with the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Consider setting CSN as a preferred source for timely updates.

Cyber Security News Tags:AppDomain hijacking, APT group, APT41, China-linked threat, Cobalt Strike, cyber espionage, Cybersecurity, DNS tunneling, GearDoor, Google Drive, Phishing, Silver Dragon

Post navigation

Previous Post: Risks of Pirated Software in Corporate Environments
Next Post: New RFP Guide Enhances AI Governance and Security

Related Posts

OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks OceanLotus Hacker Group Targeting Xinchuang IT Ecosystems to Launch Supply Chain Attacks Cyber Security News
Predatory Sparrow Group Attacking Critical Infrastructure to Destroy Data and Cause Disruption Predatory Sparrow Group Attacking Critical Infrastructure to Destroy Data and Cause Disruption Cyber Security News
Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android Cyber Security News
New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts Cyber Security News
Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in Perplexity’s Comet Browser Exploited
  • JetStream Debuts with $34M to Enhance AI Security
  • New RFP Guide Enhances AI Governance and Security
  • China-Linked Silver Dragon Uses Google Drive in Cyberattacks
  • Risks of Pirated Software in Corporate Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in Perplexity’s Comet Browser Exploited
  • JetStream Debuts with $34M to Enhance AI Security
  • New RFP Guide Enhances AI Governance and Security
  • China-Linked Silver Dragon Uses Google Drive in Cyberattacks
  • Risks of Pirated Software in Corporate Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News