Threat Actor Profile: APT27

Threat Actors, Researches

Who is APT27?

APT27 — also known as Emissary Panda, Iron Tiger, and LuckyMouse — is a Chinese state-sponsored cyber-espionage group active since at least 2010. The group has been linked to long-running campaigns against governments, critical industries, and organizations worldwide, typically seeking political, economic, strategic intelligence and occasionally financial objectives.

APT27 is recognized for its use of spear-phishing, watering-hole compromises, and exploitation of internet-facing applications to gain access, commonly relying on a mix of custom-built and widely shared malware to maintain long-term footholds in targeted networks.

APT27 (Emissary Panda) Threat Actor Card

Aliases

APT27 is tracked under multiple names by different security vendors and research organizations including:

Lucky Mouse BRONZE UNION Budworm EMISSARY PANDA
Circle Typhoon Iron Taurus Iron Tiger Threat Group-3390
Group 35 Earth Smilodon G0027 GreedyTaotie
Linen Typhoon Red Phoenix TEMP.Hippo ZipToken

Motivations & Objectives

APT27 is a Chinese state-sponsored cyber-espionage group whose operations primarily serve intelligence collection. The group’s campaigns show a clear focus on gaining and maintaining access to government, industry, and other strategic targets to extract political, economic, and technological information.

Over time, APT27 has also expanded its activity to include financially motivated intrusions, indicating a dual focus on both state-aligned espionage and profit-driven operations.

Targeted Regions & Sectors

APT27 has consistently targeted organizations across multiple global regions, prominently including North America, Southeast Asia, Western and Eastern Asia, the Middle East, Europe and South America.

The group’s operations most frequently focus on government entities, defense and aerospace, telecommunications, energy, manufacturing, high-tech and IT, research and education, business services, travel and automotive, electronics, and information technology.

APT27 – Targeted Sectors

 

APT27 has also expanded its operations into the healthcare sector. In 2021, German pharmaceutical and technology companies were targeted in campaigns aimed at stealing trade secrets and intellectual property. That same year, the U.S. Department of Health and Human Services reported that APT27 exploited a vulnerability in Zoho ManageEngine ADSelfService Plus, compromising organizations across healthcare, defense, higher education, consulting, and IT industries.

HHS Sector Alert on APT27’s exploitation of Zoho ManageEngine

Malware & Toolset

APT27 has employed a mix of custom-built malware and widely shared tools across its campaigns. Their arsenal includes long-running proprietary backdoors that have been maintained and updated over the years, alongside modular RATs and lightweight web shells used for quick access and persistence. The group also makes use of credential theft and post-exploitation utilities to extend their reach and maintain control within compromised environments.

 

Malware / Tool Description
HyperBro In-memory backdoor/RAT used for persistent access, command execution, and data exfiltration.
PlugX (aka Korplug, Sogu) Modular RAT widely used by China-nexus clusters; supports command execution, screen capture, keylogging, file operations, and process/service management.
SysUpdate Modular backdoor used by APT27 for persistence, command execution, file and process management, screenshot capture, and C2 communications; supports Windows and Linux.
ZxShell Classic China-nexus RAT.
gh0st RAT  Remote access tool (RAT) used by China-nexus cyberespionage groups.
HTTPBrowser Remote access trojan (RAT).
ASPXSpy ASP.NET webshell; APT27 uses a modified “ASPXTool” variant.
China Chopper Lightweight webshell used for foothold and post-exploitation.
Windows Credential Editor (WCE) Credential-dumping utility used to extract passwords/hashes from memory.
Mimikatz Post-exploitation credential dumper for LSASS/DPAPI/SSP creds.
gsecdump Credential-dumping tool used to pull SAM/LSA secrets and hashes.
Pandora Multistage kernel-mode rootkit/backdoor.
fscan Fast intranet scanner used for network/port discovery during intrusions.
OwaAuth Web Shell and credential stealer.
ShadowPad Modular backdoor used across China-nexus clusters; used in Operation StealthyTrident (Able Desktop supply-chain, Mongolia, 2020; LuckyMouse/Emissary Panda).

APT27 Attack Techniques

APT27 has developed and refined a wide-ranging arsenal of attack techniques that reflect both the group’s persistence and adaptability. Their operations consistently show a methodical use of structured methods, allowing them to gain access to networks, maintain long-term presence, and conduct espionage against high-value targets. These techniques form the backbone of APT27’s campaigns, supporting their ability to achieve strategic objectives while evading detection.

Initial Access

APT27 gains initial access through a range of well-documented and opportunistic methods. The group has consistently exploited vulnerabilities in internet-facing applications, including high-profile cases like Zoho ManageEngine ADSelfService Plus (CVE-2021-40539) and Microsoft Exchange ProxyLogon/ProxyShell (CVE-2021-26855/-26857/-26858/-27065). They also targeted Apache Tomcat servers using Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45105).

Beyond vulnerability exploitation, APT27 has leveraged spear-phishing emails to deliver malicious attachments or links, often tailored to specific targets and sectors.

Malicious lure document used in an APT27 campaign exploiting CVE-2017-11882

 

In some campaigns, the group has also employed watering-hole attacks, compromising legitimate websites commonly visited by their targets to silently deliver malware.

APT27 has also been observed using compromised credentials to access target environments, which allows the group to access networks and to maintain or regain access through external remote services such as VPN gateways and Outlook Web Access (OWA) portals.

Post-Compromise Actions

After achieving initial access, APT27 performs a series of strategic actions to escalate privileges, establish long-term persistence, and collect sensitive data from compromised networks. One of the group’s immediate post-exploitation steps often includes deploying web shells, such as China Chopper, which provide direct command-line access to victim servers to execute commands and upload additional payloads. APT27 has been observed using these web shells to deploy a variety of tools and malware, most notably their custom malware HYPERBRO.

The group is also known to deploy post-exploitation malware such as HYPERBRO, SysUpdate, PlugX and others through DLL sideloading, abusing trusted binaries to execute malicious code and evade detection. In addition, APT27 has been observed disabling Windows event logging to limit forensic visibility, and in some operations, deploying kernel-mode rootkits to conceal malicious activity at the system level.

APT27 employs a wide range of techniques to obtain credentials across compromised environments. The group is known for dumping operating system credentials from memory, as well as from Windows registry hives, using tools such as Mimikatz, Windows Credential Editor (WCE), gsecdump.

In addition to system-level dumping, APT27 leverages custom web shells — notably one known as OwaAuth on Microsoft Exchange OWA to log credentials directly submitted at login. The group has also used backdoors with keylogging functionality, to passively capture user credentials over time.

APT 27 Recent Activity

APT27 has been linked to numerous, large-scale espionage campaigns targeting a wide array of industries and geographies, reflecting the group’s persistent focus on intelligence collection and strategic advantage across different sectors and regions.

Operation StealthyTrident (Mongolia, 2017–2020).

A long-running supply-chain breach of Able Desktop—a chat app widely deployed across Mongolian government agencies—began with trojanized installers (from December 2017) and evolved into a compromised update mechanism that swapped legitimate updates for malware. Across phases, victims received HyperBro, PlugX/Korplug, and later Tmanger. The operators leaned on a three-pronged DLL side-loading “trident” that abused signed binaries (e.g., Symantec thinprobe.exe/IntgStat.exe and McAfee siteadv.exe) to decrypt and launch payloads at scale. Researchers noted tooling and infrastructure overlaps—HyperBro, Tmanger, and ShadowPad C2—that point to APT27’s hand and suggest possible collaboration or capability-sharing among China-nexus actors.

April 2019 – SharePoint Exploitation in the Middle East

Between April 1–16, 2019, Emissary Panda breached three SharePoint servers across two Middle East government organizations. Initial access was assessed with high confidence to be via CVE-2019-0604, after which the actors planted multiple web shells — Antak (error2.aspx) and China Chopper–style one-liners (stylecs.aspx, stylecss.aspx, test.aspx, plus two errr.aspx instances).

Using the shells as a foothold, they uploaded a mixed toolkit and began post-exploitation activities: credential dumping (e.g., Mimikatz/pwdump), network discovery (nbtscan, a netview-like etool.exe), and lateral movement via Impacket (psexec, smbexec) and custom SMB backdoors, including attempts to execute remote batch jobs with domain credentials. They scanned for and abused MS17-010 / CVE-2017-0144 (EternalBlue) where possible.

A HyperBro backdoor was deployed (via a self-extracting archive) and configured to talk over HTTPS to 185.12.45[.]134/ajax; HyperBro runs in daemon/worker modes, communicates over a named pipe, supports file/service management, screenshots, command/script execution, and shellcode injection into msiexec.exe.

For evasion, the operators used DLL sideloading with legitimate apps:

  • Sublime Text’s plugin_host.exe loading a malicious PYTHON33.dll,
  • Microsoft System Center’s CreateMedia.exe loading CreateTsMediaAdm.dll.

These DLLs decrypted obfuscated shellcode and attempted to load corresponding .hlp files for further execution.

March–September 2021 – Microsoft Exchange ProxyLogon Campaign

APT27 used Microsoft Exchange Server ProxyLogon vulnerabilities (CVE-2021-26855/-26857/-26858/-27065), affecting Exchange 2013/2016/2019, to exploit multiple flaws and deploy HyperBro. In early March 2021, the ProxyLogon vulnerabilities were exploited —seizing control of unpatched Exchange servers worldwide and stealing data.

2021 — Zoho ManageEngine ADSelfService Plus campaign

In 2021, APT27 targeted multiple industries, including healthcare, defense, energy, technology, education, higher education, consulting, and IT. by exploiting REST API authentication bypass in Zoho ManageEngine ADSelfService Plus (CVE-2021-40539), resulting in the compromise of at least nine organizations worldwide.

Operators scanned vulnerable ADSelfService Plus servers (at least 370 in the U.S.; 11,000+ internet-exposed worldwide), then delivered Godzilla web shells, the NGLite trojan, and the KdcSponge information stealer.

Post-exploitation actions included credential dumping, installing custom binaries, dropping malware for persistence and lateral movement.

On October 25, 2021, the operation shifted to exploiting Zoho ManageEngine ServiceDesk Plus (CVE-2021-44077) as patches for CVE-2021-40539 were released on September 7.

January 2022 — HyperBro backdoors in Germany

In January 2022, APT27 conducted an ongoing cyber-espionage campaign against German companies, deploying HyperBro and exploiting Microsoft Exchange 2013/2016/2019 (CVE-2021-26855/-26857/-26858/-27065) and Zoho ManageEngine ADSelfService Plus (CVE-2021-40539) for initial access. The operation focused on stealing trade secrets and intellectual property.

Mid-2022 — Supply-Chain Attack via MiMi Chat Application (multi-platform)

Iron Tiger carried out a supply-chain compromise of the MiMi chat application by taking control of the servers that host its desktop installers, turning legitimate downloads into delivery vehicles for HyperBro on Windows and a new rshell backdoor on macOS (with related Linux builds also found). The campaign surfaced when a server was seen hosting both HyperBro and a malicious Mach-O “rshell,” and further analysis showed MiMi installers fetching these payloads.

On the timeline, the first compromised macOS installer was v2.3.0 (May 26, 2022); v2.2.10 (May 6, 2022) was clean. For Windows, v2.2.0 and v2.2.1 (both Nov 23, 2021) already contained injected code. In some cases the attackers modified a clean installer in about 90 minutes, inserting obfuscated JavaScript into electron-main.js.

On Windows, the injected code dropped an EXE, DLL, and a binary to the temp directory and used DLL sideloading (via a DESlock+ executable) to load HyperBro. On macOS, users had to bypass repeated “unverified developer” prompts; notably, both clean and trojanized installers were unsigned.

The rshell backdoor collects OS details, communicates with its C2 using BSON over TCP, supports interactive command execution and file operations, and was seen in macOS (Mach-O) and Linux (ELF) builds, with the oldest sample traced to June 2021.

Targeting observed in telemetry centered on Taiwan and the Philippines (13 targets total); one identified victim was a Taiwanese game developer, and related traffic touched veryssl[.]org subdomains used as C2.

October 2022 – Iron Tiger updates SysUpdate, adds Linux targeting.

Iron Tiger refreshed its custom backdoor SysUpdate, adding Linux support and retooling its loader to complicate analysis. The oldest updated sample dates to July 2022. Notable code changes include removal of RTTI classes and a switch to the ASIO C++ library. A campaign timeline shows C2 and build activity ramping from April–July 2022.

The multi-stage loading chain abuses DLL sideloading with legitimate executables (e.g., Microsoft’s rc.exe, INISafeWebSSO, DESlock, Ubisoft’s installer, and Wazuh components). A malicious DLL decrypts Shikata Ga Nai shellcode, which installs, persists (registry/service), and process-hollows the next stage. Researchers highlight the first observed abuse of a Wazuh-signed executable, likely to blend into victim environments.

Capabilities mirror prior versions (service/process managers, file manager, screenshots, command exec) and now include DNS TXT–based C2; the malware queries system DNS (fallback 8.8.8.8) and encodes identifiers to drive TXT lookups, with configuration and host details DES-encrypted in transit. A stolen code-signing certificate (linked to a VMProtect demo) was used to sign samples; it was later revoked.

October 2022 — Budworm operations in U.S., Middle East, and Asia

In October 2022, Budworm was documented conducting a six-month campaign against strategically significant targets: a Middle East government, a multinational electronics manufacturer, and a U.S. state legislature.

Initial access leveraged Log4j vulnerabilities (CVE-2021-44228, CVE-2021-45105) in Apache Tomcat services to install web shells. The group then abused the CyberArk Viewfinity software for DLL sideloading to load their custom HyperBro backdoor, also deploying PlugX/Korplug at times, and used tools including Cobalt Strike, LaZagne, IOX proxy/port-forwarding tool, Fast Reverse Proxy, and Fscan.

August 2023 — Budworm updates SysUpdate in attacks on telecoms and government

In August 2023, Budworm (aka LuckyMouse / Emissary Panda / APT27) targeted a Middle Eastern telecommunications organization and an Asian government, deploying a previously unseen variant of its SysUpdate backdoor (inicore_v2.3.30.dll). In both intrusions, investigators only observed credential harvesting, suggesting the activity may have been interrupted early in the attack chain.

Budworm executed SysUpdate via DLL sideloading using the legitimate INISafeWebSSO application—a technique the group has used for years—while leaning on living-off-the-land and public tools for discovery and theft, including AdFind, curl, SecretsDump, and a PasswordDumper utility.

July 2024 — BfV warns of APT27 activity in Europe

On July 11, 2024, Germany’s domestic intelligence service (Bundesamt für Verfassungsschutz) posted a tweet warning that APT 27 was likely attacking entities in Europe, using new versions of the known RSHELL malware, and shared a YARA rule for defenders.

BFV tweet on APT27 RSHELL attacks in Europe

June 12, 2025 — Iron Taurus (APT27) still active in 2025

Unit 42 confirmed that Iron Taurus (APT27) continues to operate and remains an active threat and uses the custom malware family SysUpdate. Over the past two years, devices in 45 countries have been observed connecting to the group’s SysUpdate C2 infrastructure.

Top 10 countries with the most observed connections

  • Taiwan (TW)
  • Afghanistan (AF)
  • India (IN)
  • China (CN)
  • Lithuania (LT)
  • Pakistan (PK)
  • United States (US)
  • Hong Kong (HK)
  • Singapore (SG)
  • Iran (IR)
Unit 42 tweet showing countries most affected by APT27 SysUpdate C2 activity

Critical Vulnerabilities Exploited by APT27

APT27 exploited multiple Microsoft Exchange Server 2013, 2016, and 2019 ProxyLogon vulnerabilities CVE‑2021‑26855, CVE‑2021‑26857, CVE‑2021‑26858, and CVE‑2021‑27065 to gain unauthenticated access and deploy HYPERBRO.

Between March and mid‑September 2021, the group leveraged a Zoho ManageEngine ADSelfService Plus vulnerability (CVE‑2021‑40539) for unauthorized access; from late October 2021, they moved to exploit CVE‑2021‑44077 in Zoho’s ServiceDesk Plus

APT27 also exploited a SharePoint server vulnerability, CVE‑2019‑0604, in April 2019 to deploy web shells on government-related SharePoint servers in the Middle East.

In late 2022, APT27 (also tracked as “Budworm”) exploited high-severity Log4j vulnerabilities (CVE‑2021‑44228 and CVE‑2021‑45105) to infect systems running Apache Tomcat and install web shells.

In earlier operations, BRONZE UNION leveraged the Kekeo credential tool to exploit CVE-2014-6324 (Microsoft Kerberos) for domain privilege escalation.

The group has also used weaponized Microsoft Office documents exploiting Equation Editor CVE-2018-0798 to achieve code execution and payload delivery.

Law Enforcement Actions and Recent Indictments

On March 5, 2025, the U.S. Department of Justice unsealed charges against 12 Chinese nationals involved in global intrusion campaigns. The defendants included two MPS officers, eight i-Soon employees, including Yin Kecheng and Zhou Shuai (also known as “Coldface”). According to the indictment, both individuals are members of APT27.

The DOJ stated that between August 2013 and December 2024, Yin, Zhou, and their co-conspirators conducted unauthorized intrusions into victim networks by exploiting software vulnerabilities, conducting internal reconnaissance, and deploying malware such as PlugX to establish persistent access. The indictment alleges that the group stole data from compromised networks and transferred it to servers under their control.

According to the indictment, Yin and Zhou brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military. The DOJ stated that Zhou sold data stolen by Yin through i-Soon, whose primary customers were PRC government agencies, including the Ministry of State Security (MSS) and Ministry of Public Security (MPS).

The group’s operations were financially motivated, and their targeting extended beyond intelligence requirements, affecting U.S. technology firms, law firms, defense contractors, healthcare systems, universities, local governments, and think tanks. The DOJ noted that the intrusions caused millions of dollars in damages.

The indictment further states that Yin continued hacking activity through at least December 2024, including involvement in a cyber intrusion targeting the U.S. Department of the Treasury. The DOJ reported that the FBI seized infrastructure—including virtual private servers—used by the actors to facilitate this and other operations.

As part of a coordinated action, the U.S. Department of the Treasury sanctioned Yin, Zhou, and Zhou’s company, Shanghai Heiying Information Technology Co., Ltd.

The Department of State also announced reward offers of up to $2 million each for information leading to the arrests of Yin and Zhou. Both individuals remain at large in China.

DOJ press release: $2M reward offers for information on Yin Kecheng and Zhou Shuai

 

The FBI’s Internet Crime Complaint Center (IC3) also issued a public alert on the same day (I-030525-PSA), identifying APT27 and i-Soon as key players in China’s state-sponsored hacking ecosystem and detailing their role in the broader strategy of cyber-enabled repression and data theft.

FBI IC3 Public Service Announcement I-030525-PSA (March 5, 2025)

Suspected Ransomware Activity

Polar ransomware (April 2020)

Incident responders traced mass file encryption to an intrusion that began in early 2018 via a vulnerable perimeter server. The operators maintained access with China Chopper / TwoFace web shells, performed credential dumping (including LSASS), scanned for Eternal* SMB flaws, and installed SysUpdate and HyperBro for persistence. On April 29, 2020, they pivoted to monetization by pushing Polar via a DLL-hijack chain: a legitimate GDFInstall.exe loaded a malicious GameuxInstallHelper.dll, which decrypted and ran Sysurl.Hex (the Polar payload). The ransomware cleared logs and shadow copies, used .locked / .cryptd extensions, dropped an HTML note, and beaconed host names over HTTP; responders recovered data due to weaknesses in its crypto.

Researchers noted that Tooling and tradecraft overlapped with APT27/Emissary Panda—notably prior use of SysUpdate and HyperBro for persistence—yet the target type (a media org), the presence of cryptomining and ransomware, and infrastructure details introduce doubt. They noted strong indicators pointing at APT27 but not conclusive proof.

Gaming-sector incident (December 2020) — BitLocker, Clambling, PlugX

Incident responders documented a breach at a major gaming company where the operators encrypted core servers using Windows BitLocker (native “living-off-the-land” encryption rather than dropping a commodity ransomware binary). Initial access came via a compromised third-party service provider; the operators deployed ASPXSpy web shells, then side-loaded PlugX and a “Clambling” backdoor through a signed Google Updater executable (GoogleUpdate.exe + malicious goopdate.dll, payload in license.rtf/English.rtf). Post-exploitation included credential dumping (Mimikatz/WCE) and privilege escalation using CVE-2017-0213, followed by process injection into msiexec.exe and svchost.exe, command/control over TCP/UDP/HTTP, and backdoor features such as keylogging, screenshotting, file management, and clean-up. The activity aligns with the broader DRBControl/Clambling campaign that targeted gaming firms and was previously linked in reporting to Chinese intrusion sets.

The operation shows strong overlaps with APT27/Emissary Panda (PlugX/“Clambling” side-loaded via a signed GoogleUpdate chain, ASPXSpy, and a familiar post-ex playbook), but it also exhibits Winnti-family hallmarks (infrastructure/mutex patterns and post-ex commands). No HyperBro sample was recovered in this case; overall attribution remains unresolved (APT27 vs. Winnti remains plausible).

False Flag Identity on Twitter

In August 2022, during U.S. House Speaker Nancy Pelosi’s visit to Taiwan, a Twitter account using the handle @APT27_Attack announced a “cyber war” against Taiwan. The group carried out distributed denial-of-service (DDoS) operations that temporarily disrupted several Taiwanese government websites, alongside defacements at convenience stores and train stations displaying anti-Pelosi messages.

Tweet from @APT27_Attack announcing cyber operations against Taiwan (August 2022)

 

Because of its name, APT27_Attack was initially associated with the espionage group APT27, but its operators publicly denied any link. In a tweet posted on August 3, 2022, the account stated:

“We don’t belong to the government, we come from countries all over the world, about people comparing us to the notorious APT27, what I want to say is that we are 27 Attack, you can call us 27, we have completed the task, we will not be publishing anything, good luck :)”

Tweet from @APT27_Attack denying affiliation with APT27 (August 3, 2022)

 

Security researchers assessed that the group was a hacktivist collective rather than the authentic APT27, noting their public declarations, short-lived operations, and reliance on unsophisticated tools contrasted with APT27’s hallmark tradecraft of long-term covert espionage. Comparative analysis of tactics, techniques, and procedures (TTPs) showed no overlap between the two.

MITRE ATT&CK®

Tactic Technique ID
Initial Access Exploit Public-Facing Application T1190
Spearphishing Attachment T1566.001
Drive-by Compromise (watering hole) T1189
External Remote Services T1133
Execution Command & Scripting Interpreter: PowerShell T1059.001
Command & Scripting Interpreter: Windows Cmd T1059.003
Process Injection: Process Hollowing T1055.012
Windows Management Instrumentation T1047
Exploitation for Client Execution T1203
Persistence Server Software Component: Web Shell T1505.003
Create/Modify System Process: Windows Service T1543.003
Registry Run Keys/Startup Folder T1547.001
Scheduled Task/Job T1053
Modify Registry T1112
Privilege Escalation Exploitation for Privilege Escalation T1068
Bypass User Account Control T1548.002
Credential Access OS Credential Dumping T1003
Credentials from Password Stores T1555
Input Capture: Keylogging T1056.001
Collection Screen Capture T1113
Discovery Network Service Scanning T1046
Remote System / Account Discovery T1018 / T1033
Account Discovery: Local Account T1087
System Network Configuration Discovery T1016
System Network Connections Discovery T1049
Data from Local System T1005
Lateral Movement Exploitation of Remote Services T1210
Lateral Tool Transfer T1570
Resource Development Obtain Capabilities: Code Signing Certificates T1588.003
Obtain Capabilities: Tool T1588.002
Stage Capabilities: Upload Malware T1608.001
Stage Capabilities: Upload Tool T1608.002
Stage Capabilities: Drive-by Target T1608.004
Command and Control Application Layer Protocol: Web Protocols T1071.001
Exfiltration Data Staged: Local T1074.001
Data Staged: Remote T1074.002
Archive Collected Data T1560.001
Exfiltration Over Web Service: To Cloud Storage (Dropbox) T1567.002
Exfiltration Over C2 Channel T1041
Defense Evasion DLL Side-Loading T1574.001
Obfuscated/Compressed Files & Info T1027
Indicator Removal T1070
Impair Defenses: Disable Windows Event Logging T1562.002
Deobfuscate/Decode Files or Information T1140

Indicators of Compromise (IOCs)

Description / Type Hash / IOC
HyperBro C2 hxxps://185.12.45[.]134:443/ajax
Malicious lure document 4fce3d38e0a308088cd75c2ef1bb5aa312e83447d63a82f62839d3609a283b02
Malicious lure document 3e04eb55095ad6a45905564d91f2ab6500e07afcdf9d6c710d6166d4eef28185
Malicious lure document 4123a19cda491f4d31a855e932b8b7afdcf3faf5b448f892da624c768205a289
HyperBro 04f48ed27a83a57a971e73072ac5c769709306f2714022770fb364fd575fd462
stylecs.aspx 2feae7574a2cc4dea2bff4eceb92e3a77cf682c0a1e78ee70be931a251794b86
stylecss.aspx d1ab0dff44508bac9005e95299704a887b0ffc42734a34b30ebf6d3916053dbe
test.aspx 6b3f835acbd954af168184f57c9d8e6798898e9ee650bd543ea6f2e9d5cf6378
error2.aspx 006569f0a7e501e58fe15a4323eedc08f9865239131b28dc5f95f750b4767b38
OwaAuth web shell 0e823a5b64ee761b70315548d484b5b9c4b61968b5068f9a8687c612ddbfeb80
Pandora rootkit af31c16dcd54ee11d425eb3a579ad0606a05b36c0605cc16007f3d3c84d8e291
SysUpdate b39e2cf333b9f854bcdf993aa6c1f357d2a7042139e4c6ca47ed504090006a61
HyperBro e74056a729e004031b78007708bb98d759ff94b46866898c5a05d87013cd643c
HyperBro 52072a8f99dacd5c293fccd051eab95516d8b880cd2bc5a7e0f4a30d008e22a7
Linux Sysupdate 6d9031eb617096439bc8c8f7c32f4a11ffefc4326d99229fc78722873092e400
Windows Sysupdate DLL d950cc937f4df9ab0bad44513d23ea7ecdfae2b0de8ba351018de5fb5d7b1382
Windows Sysupdate payload 123880edc91f7dc033a769d9523f783f7b426673ee95e9e33654cdfa95a6462c
Trojanized Able Desktop 07f87f7b3313acd772f77d35d11fc12d3eb7ca1a2cd7e5cef810f9fb657694a0
Korplug c2dc17bdf16a609cdb5a93bf153011d67c6206f7608931b1ca1c1d316b5ad54f

References

– https://www.ic3.gov/PSA/2025/PSA250305
– https://www.justice.gov/opa/pr/justice-department-charges-12-chinese-contract-hackers-and-law-enforcement-officers-global
– https://www.hhs.gov/sites/default/files/chinese-cyberspionage-campaign-targets-multiple-industries.pdf
– https://www.trellix.com/blogs/research/cyber-tools-and-foreign-policy/
– https://cloud.google.com/security/resources/insights/apt-groups
– https://scythe.io/threat-thursday/apt27
– https://attack.mitre.org/groups/G0027/
– https://hivepro.com/threat-advisory/apt27-group-uses-the-hyperbro-remote-access-trojan-to-inject-backdoors-into-victims-network/
– https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/
– https://atheniantech.com/reports/Athenian-tech-APT-27-Threat-Analysis-Report.pdf
– https://www.trendmicro.com/en_us/research/22/h/irontiger-compromises-chat-app-Mimi-targets-windows-mac-linux-users.html
– https://sed-cms.broadcom.com/system/files/threat-hunter-whitepaper/2025-04/2025_04_ChinaLinked_Espionage_Actors.pdf
– https://www.anomali.com/blog/anomali-cyber-watch-ransom-cartel-uses-dpapi-dumping-unknown-china-sponsored-group-targeted-telecommunications-alchimist-c2-framework-targets-multiple-operating-systems-and-more
– https://x.com/Unit42_Intel/status/1933565063736021372
– https://x.com/BfV_Bund/status/1811364839656185985
– https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html
– https://www.verfassungsschutz.de/SharedDocs/publikationen/DE/cyberabwehr/2022-01-bfv-cyber-brief.pdf?__blob=publicationFile&v=10
– https://global.ptsecurity.com/en/research/pt-esc-threat-intelligence/incident-response-polar-ransomware-apt27/
– https://web.archive.org/web/20210104144857/https%3A//shared-public-reports.s3-eu-west-1.amazonaws.com/APT27%2Bturns%2Bto%2Bransomware.pdf
– https://www.secureworks.com/research/threat-group-3390-targets-organizations-for-cyberespionage
– https://www.cfr.org/cyber-operations/targeting-german-pharmaceutical-and-technology-firms
– https://www.welivesecurity.com/2020/12/10/luckymouse-ta428-compromise-able-desktop
– https://www.trendmicro.com/en_us/research/21/d/iron-tiger-apt-updates-toolkit-with-evolved-sysupdate-malware-va.html
– https://www.secureworks.com/research/bronze-union
– https://www.welivesecurity.com/2020/12/10/luckymouse-ta428-compromise-able-desktop

Free Dark Web Report

Keep reading