Threat Intelligence, Malware

Southeast Asia subjected to suspected Chinese cyberespionage campaign

China flag on a computer chip

Numerous high-profile organizations across Southeast Asia, including government agencies from two countries, a telecommunications firm, and an air traffic control entity, have been compromised by a suspected Chinese threat operation as part of a cyberespionage campaign that commenced in October 2023, The Hacker News reports.

Attacks involved the exploitation of open-source and living-off-the-land tactics previously associated with Chinese advanced persistent threat groups, including the Rakshasa and Stowaway reverse proxy programs, the PlugX remote access trojan, and custom DLL files enabling login credential exfiltration, according to an analysis from the Symantec Threat Hunter Team. "The geographical location of targeted organizations, as well as the use of tools linked previously to China-based APT groups, suggests that this activity is the work of China-based actors," said researchers, who also noted the threat actors' prolonged attack dwell times to indicate the operation's sophistication. Such findings follow a joint SentinelOne SentinelLabs and Tinextra Cyber report detailing a China-linked cyberespionage campaign against Southern European business-to-business IT service providers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds