top of page

Silver Dragon: APT41-Linked Threat Targeting Governments with Cobalt Strike and Google Drive C2

  • Mar 4
  • 2 min read

Key Findings


  • Silver Dragon, an APT group linked to APT41, has been targeting government entities in Europe and Southeast Asia since mid-2024.

  • The group gains initial access by exploiting public-facing internet servers and delivering phishing emails with malicious attachments.

  • Silver Dragon uses techniques like Cobalt Strike beacons and DNS tunneling for persistence and command-and-control (C2) communication.

  • The group employs multiple infection chains, including AppDomain hijacking, service DLL, and email-based phishing, to deliver Cobalt Strike payloads.

  • Silver Dragon utilizes various post-exploitation tools, such as SilverScreen, SSHcmd, and GearDoor, for remote access and data exfiltration.

  • The group leverages Google Drive for covert C2 communication, with the backdoor uploading and downloading data through the cloud storage service.


Background


APT41 is a prolific Chinese hacking group known for targeting various sectors, including healthcare, telecommunications, high-tech, education, travel services, and media, for cyber espionage since as early as 2012. The group is also believed to engage in financially motivated activity potentially outside of state control.


Silver Dragon, which is assessed to be operating within the APT41 umbrella, has been observed primarily targeting government entities in Europe and Southeast Asia since mid-2024.


Initial Access and Persistence


Silver Dragon gains its initial access by exploiting public-facing internet servers and delivering phishing emails with malicious attachments. To maintain persistence, the group hijacks legitimate Windows services, allowing the malware processes to blend into normal system activity.


Infection Chains


The researchers identified three different infection chains used by Silver Dragon to deliver Cobalt Strike:


1. AppDomain hijacking: This chain uses a batch script within a compressed archive to drop a .NET-based loader responsible for decrypting and executing a second-stage payload.


2. Service DLL: This chain employs a batch script to deliver a shellcode DLL loader dubbed BamboLoader, which is registered as a Windows service.


3. Email-based phishing: This campaign primarily targets Uzbekistan with malicious Windows shortcuts (LNK) as attachments, leading to the extraction and execution of next-stage payloads.


Post-Exploitation Tools


Silver Dragon deploys various post-exploitation tools, including:


  • SilverScreen: A .NET screen-monitoring tool used to capture periodic screenshots of user activity.

  • SSHcmd: A .NET command-line SSH utility that provides remote command execution and file transfer capabilities.

  • GearDoor: A .NET backdoor that communicates with its C2 infrastructure via Google Drive, using different file extensions to indicate the nature of the task to be performed on the infected host.


Google Drive C2 Communication


The group's use of Google Drive for covert C2 communication is a notable aspect of Silver Dragon's operations. The GearDoor backdoor authenticates to an attacker-controlled Google Drive account and uploads a heartbeat file containing basic system information. The results of task execution are also captured and uploaded to Google Drive.


Ties to APT41


Silver Dragon's links to APT41 are evidenced by the tradecraft overlaps with post-exploitation installation scripts previously attributed to the latter group.


Sources


  • https://thehackernews.com/2026/03/apt41-linked-silver-dragon-targets.html

  • https://x.com/Dinosn/status/2029131146173288580

  • https://cybersecuritynews.com/silver-dragon-apt-group/

  • https://securityaffairs.com/188895/apt/from-phishing-to-google-drive-c2-silver-dragon-expands-apt41-playbook.html

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page