Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Chinese APTs Expand Targets, Update Backdoors in Recent Campaigns

Salt Typhoon has hit an energy entity in Azerbaijan. Twill Typhoon has targeted Asian entities with an updated RAT.

China APT

China-linked state-sponsored hackers have been observed expanding their targets and updating malicious tools in fresh campaigns that either follow known patterns or adapt to current political events.

Between December 2025 and February 2026, Salt Typhoon, also known as Earth Estries, FamousSparrow, GhostEmperor, and UNC2286, and considered one of the most aggressive Chinese APTs, was seen targeting an Azerbaijani oil and gas company, Bitdefender reports.

The campaign marked a shift from typical Salt Typhoon activity and was apparently aimed at government, telecoms, and technology entities in the US, Asia, the Middle East, and Africa, likely triggered by Azerbaijan’s recently increased role in European energy security.

According to Bitdefender, as a result of Russia’s Ukraine gas transit agreement expiration and the recent Strait of Hormuz disruptions, Azerbaijan has become a strategic energy partner for European countries, putting it in APT crosshairs.

The recently observed intrusion, attributed with moderate-to-high confidence to Salt Typhoon, started with Microsoft Exchange vulnerability exploitation, followed by web shell deployment, command execution, DLL sideloading, and backdoor deployment.

In December, the threat actor used the ProxyNotShell exploit chain for code execution on Exchange servers, deployed web shells to establish a foothold, and then deployed the Deed RAT via an updated DLL sideloading technique.

Advertisement. Scroll to continue reading.

The backdoor was hidden in a folder mimicking the legitimate LogMeIn Hamachi installation, and persistence was achieved through a service masquerading as LogMeIn Hamachi, which was launched at system startup.

After compromising the initial host, the attackers abused RDP to access a second server, logged in to an administrator account, and then deployed Deed RAT, likely as part of hands-on keyboard activity. Next, they used Impacket tools to compromise a third host.

A month later, after the malware was removed from at least one host, the hackers accessed the initially compromised server and deployed the TernDoor backdoor, which was linked to Salt Typhoon by Cisco’s Talos security researchers.

At the end of February, the APT accessed the victim organization’s environment again, attempting to redeploy Deed RAT using the same execution chain.

“This intrusion should not be viewed as an isolated compromise, but as a sustained and adaptive operation conducted by an actor that repeatedly sought to regain and extend access within the victim environment. Across multiple waves of activity, the same access path was revisited, new payloads were introduced, and additional footholds were established,” Bitdefender notes.

Twill Typhoon attacks

Beginning September 2025 and continuing through at least April 2026, Darktrace observed the China-linked APT Twill Typhoon (also known as Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, and TA416) targeting entities in the Asia-Pacific and Japan (APJ) region with an updated arsenal, including a modular .NET-based RAT framework.

Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs.

The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading.

During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.

The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.

The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.

“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.

Related: Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking

Related: China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

Related: Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says

Related: FBI Warns of Data Security Risks From China-Made Mobile Apps

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

iCOUNTER has appointed Lisa Hayashi as CMO and Bob Kalchthaler as CFO.

Thomas Bain has been appointed Chief Marketing Officer at Silent Push.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.