top of page

China-Linked Hackers Target U.S. Entities in Long-Term Espionage Campaigns

  • Nov 8, 2025
  • 2 min read

Key Findings


  • China-linked hackers targeted a U.S. non-profit organization in a long-term espionage campaign.

  • The group gained access to the network for several weeks in April 2025 and used various techniques to establish persistence and maintain long-term access.

  • The attackers leveraged DLL sideloading via the vetysafe.exe application, a tactic commonly associated with China-linked APT groups such as Space Pirates, Kelp, and Earth Longzhi (a subgroup of APT41).

  • The group also used the Imjpuexc Microsoft file for East Asian input to mask their activities.

  • The hackers were interested in targeting domain controllers, potentially allowing them to spread to many machines on the network.


Background


China-linked actors have a history of targeting U.S. organizations with links to or involvement in policy issues, as part of their espionage efforts. This latest intrusion into a U.S. non-profit organization active in attempting to influence U.S. government policy on international issues is another example of this trend.


Intrusion Details


  • On April 5, 2025, a mass scan targeted a server with multiple public exploits, including Log4j, Atlassian OGNL CVE-2022-26134, Apache Struts CVE-2017-9805, and GoAhead RCE CVE-2017-17562.

  • The activity resumed on April 16 with reconnaissance, including repeated curl commands to external sites and to 192.0.0[.]88, indicating connectivity testing and difficulties reaching that host.

  • The attackers ran netstat to enumerate TCP connections and then created a persistent scheduled task "\Microsoft\Windows\Ras\Outbound" running msbuild.exe every hour as SYSTEM to execute an outbound.xml, which likely injected code into csc.exe that connected to a command-and-control server.

  • At 02:50, a custom loader was executed, loading an encrypted payload into memory, likely a remote access tool (RAT).

  • The attackers abused VipreAV's vetysafe.exe to perform DLL sideloading and install sbamres.dll, a technique linked to China-associated actors such as Space Pirates and Earth Longzhi/APT41 subgroups, including Kelp.

  • Security teams also observed DCSync-like activity and the use of Imjpuexc on the same day.


Attacker Objectives


The activity on the victim network suggests that the attackers were aiming to establish a persistent and stealthy presence, with a particular interest in targeting domain controllers. This could potentially have allowed them to spread to many machines on the network and gain broader access.


China-linked groups have a history of focusing on espionage activities, including monitoring foreign governments' attitudes and policies toward China. This intrusion into a U.S. non-profit organization is likely part of a wider effort to gather intelligence and influence policy-related matters.


Sources


  • https://securityaffairs.com/184351/apt/china-linked-hackers-target-u-s-non-profit-in-long-term-espionage-campaign.html

  • https://www.facebook.com/HackRead/posts/china-linked-hackers-known-as-storm-1849-are-actively-targeting-the-cisco-asa-fi/1385750373550536/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page