CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 13, 2026

APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials

Dark Reading Archived Apr 13, 2026 ✓ Full text saved

The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.

Full text archived locally
✦ AI Summary · Claude Sonnet


    СLOUD SECURITY CYBERATTACKS & DATA BREACHES THREAT INTELLIGENCE VULNERABILITIES & THREATS NEWS APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication. Elizabeth Montalbano,Contributing Writer April 13, 2026 4 Min Read SOURCE: PIXELS HUNTER VIA SHUTTERSTOCK The notorious Chinese threat group APT41 is using an undetectable backdoor malware to target Linux-based cloud workloads to steal credentials from Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, and Alibaba Cloud environments.  The backdoor attributed to APT41 (aka Winnti, Wicked Panda, Barium, Silver Dragon and Brass Typhoon) is written in the cloud-native executable and linkable format (ELF) and uses SMTP port 25 as a covert command-and-control (C2) channel to make its activity "invisible to conventional scanning tools like Shodan and Censys," according to a recent report from Breakglass Intelligence.  "The ELF binary is a stripped, statically linked x86-64 executable designed for persistence on Linux cloud instances," according to the report. "At the time of analysis, it carries zero detections on VirusTotal." The backdoor is the result of at least six years of investment by APT41 in developing cloud-native tooling, "progressing from basic reverse shells to purpose-built cloud credential harvesters with scanner-resistant C2," according to the report. The campaign also leverages typosquatting in a way that obscures its malicious network activity, making it especially difficult to track, researchers said. Related:TeamPCP Breaches Cloud, SaaS Instances With Stolen Credentials APT41, first identified in 2012, is among the most prolific China-linked threat groups currently active and is known for conducting espionage on behalf of Beijing while also pursuing cybercrime for financial gain. More a collective than one single group of threat actors, APT41 saw the US government indict five of its members in 2020 for participating in or contributing to attacks on more than 100 companies worldwide. However, those indictments have done little to deter the group's activities so far. Typosquatting for Evasion The recently discovered APT41 operation targets modern cloud workloads rather than traditional endpoints, using the ELF backdoor to harvest cloud provider credentials and metadata from various environments. Once deployed, the backdoor immediately starts probing the AWS instance metadata service — the familiar 169.254.169.254 endpoint — to extract temporary credentials tied to the host's cloud identity.  LOADING... In environments where permissions are overly broad, that single step can open the door to far wider access, according to Breakglass. The backdoor also queries other services for Azure, Alibaba, and GCP. Moreover, the group's use of three typosquatted domains makes the campaign particularly difficult to track. The operators rely on domains that closely resemble legitimate Alibaba Cloud services as well as use the Chinese cybersecurity brand Qianxin, employing classic typosquatting techniques that blend malicious traffic into the background noise of normal operations.  Related:CSA Launches CSAI Foundation for AI Security "All three domains were registered through NameSilo within a 24-hour burst window (January 20-21, 2026) with privacy protection enabled," according to the report. "This registration pattern is consistent with APT41 infrastructure procurement tradecraft — bulk registration through budget registrars with WHOIS privacy, followed by immediate deployment." Indeed, tapping legitimate cloud services to obscure C2 traffic is typical of APT41 behavior and is an oft-used tactic by threat actors to hide their malicious activities. Moreover, even when defenders identify the infrastructure, the C2 servers used in the campaign are deliberately unresponsive to casual probing, engaging only with traffic that mimics the malware's precise communication pattern, according to Breakglass. Detection and Prevention Cloud credentials are the keys to the kingdom, and once adversaries obtain them they can act as legitimate users within a cloud environment to create havoc by moving across services, escalating privileges, and maintaining access without leaving the usual malware footprints. Related:Native Launches With Security Control Plane for Multicloud To help detect if APT41 has violated an organization's cloud environment using the backdoor, Breakglass provided advice for network-based, host-based, and cloud-native detection of the malicious activity for immediate remediation.  To detect APT41 activity at the network level, defenders should monitor for outbound SMTP (port 25) traffic from non-mail workloads, which should not be initiating these connections. They also should set up an alert on UDP broadcast traffic to port 6006, a non-standard service port that would signal anomalous traffic. Further, organizations can lock or monitor connections to 43[.]99[.]48[.]196 and the three typosquatted domains, according to Breakglass. For host-based detections, defenders can audit for unexpected reads of cloud credential files, as well as monitor cloud instance metadata API calls from non-standard processes, since legitimate SDKs and command-line interfaces have known process names. They also can hunt for stripped, statically-linked ELF binaries in unexpected locations, including places such as: /tmp, /var/tmp, and /dev/shm. Cloud-native detection includes enabling AWS CloudTrail and Google Cloud Audit Logs and setting up alerts on credential usage from unexpected source IPs, reviewing IAM role assumption events for anomalous patterns, and implementing IMDSv2 (AWS) to require session tokens for metadata access, which raises the bar for credential theft, according to Breakglass. Don't miss the latest Dark Reading Confidential podcast, Security Bosses Are All in on AI: Here's Why, where Reddit CISO Frederick Lee and Omdia analyst Dave Gruber discuss AI and machine learning in the SOC, how successful deployments have (or haven’t) been, and what the future holds for AI security products. Listen now!   About the Author Elizabeth Montalbano Contributing Writer Elizabeth Montalbano is a freelance writer, journalist, and therapeutic writing mentor with more than 25 years of professional experience. Her areas of expertise include technology, business, and culture. Elizabeth previously lived and worked as a full-time journalist in Phoenix, San Francisco, and New York City; she currently resides in a village on the southwest coast of Portugal. In her free time, she enjoys surfing, hiking with her dogs, traveling, playing music, yoga, and cooking. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports AI SOC for MDR: The Structural Evolution of Managed Detection and Response How Enterprises Are Developing Secure Applications Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Gartner IGA Voice of the Customer 2026 Access More Research Webinars Tips for Managing Cloud Security in a Hybrid Environment? Zero Trust Architecture for Cloud environments: Implementation Roadmap Security in the AI Age Identity Maturity Under Pressure: 2026 Findings and How to Catch Up Building a Robust SOC in a Post-AI World More Webinars You May Also Like СLOUD SECURITY Phishing Empire Runs Undetected on Google, Cloudflare by Elizabeth Montalbano, Contributing Writer SEP 04, 2025 СLOUD SECURITY SANS Top 5: Cyber Has Busted Out of the SOC by Becky Bracken MAY 01, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 СLOUD SECURITY Chinese APT Mustang Panda Debuts 4 New Attack Tools by Nate Nelson, Contributing Writer APR 18, 2025 Editor's Choice CYBERSECURITY OPERATIONS RSAC 2026: AI Dominates, But Community Remains Key to Security byKristina Beek,Rob Wright APR 2, 2026 THREAT INTELLIGENCE Axios Attack Shows How Complex Social Engineering Is Industrialized byAlexander Culafi APR 6, 2026 5 MIN READ ICS/OT SECURITY Iranian Threat Actors Disrupt US Critical Infrastructure via Exposed PLCs byElizabeth Montalbano APR 8, 2026 4 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection LOADING... Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Tips for Managing Cloud Security in a Hybrid Environment? THURS, MAY 7, 2026 AT 1PM EST Zero Trust Architecture for Cloud environments: Implementation Roadmap TUES, MAY 12, 2026 AT 1PM EST Security in the AI Age TUES, APRIL 28, 2026 AT 1PM EST Identity Maturity Under Pressure: 2026 Findings and How to Catch Up WED, MAY 6,2026 AT 1PM EST Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST More Webinars White Papers How Sunrun Transformed Security Operations with AiStrike Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity Explore More White Papers BLACK HAT ASIA | MARINA BAY SANDS, SINGAPORE Experience cutting-edge cybersecurity insights in this four-day event featuring expert Briefings on the latest research, Arsenal tool demos, a vibrant Business Hall, networking opportunities, and more. Use code DARKREADING for a Free Business Pass or $200 off a Briefings Pass. GET YOUR PASS GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Apr 13, 2026
    Archived
    Apr 13, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗