CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 14, 2026

Chinese APTs Expand Targets, Update Backdoors in Recent Campaigns

Security Week Archived May 14, 2026 ✓ Full text saved

Salt Typhoon has hit an energy entity in Azerbaijan. Twill Typhoon has targeted Asian entities with an updated RAT. The post Chinese APTs Expand Targets, Update Backdoors in Recent Campaigns appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    China-linked state-sponsored hackers have been observed expanding their targets and updating malicious tools in fresh campaigns that either follow known patterns or adapt to current political events. Between December 2025 and February 2026, Salt Typhoon, also known as Earth Estries, FamousSparrow, GhostEmperor, and UNC2286, and considered one of the most aggressive Chinese APTs, was seen targeting an Azerbaijani oil and gas company, Bitdefender reports. The campaign marked a shift from typical Salt Typhoon activity and was apparently aimed at government, telecoms, and technology entities in the US, Asia, the Middle East, and Africa, likely triggered by Azerbaijan’s recently increased role in European energy security. According to Bitdefender, as a result of Russia’s Ukraine gas transit agreement expiration and the recent Strait of Hormuz disruptions, Azerbaijan has become a strategic energy partner for European countries, putting it in APT crosshairs. The recently observed intrusion, attributed with moderate-to-high confidence to Salt Typhoon, started with Microsoft Exchange vulnerability exploitation, followed by web shell deployment, command execution, DLL sideloading, and backdoor deployment. In December, the threat actor used the ProxyNotShell exploit chain for code execution on Exchange servers, deployed web shells to establish a foothold, and then deployed the Deed RAT via an updated DLL sideloading technique. The backdoor was hidden in a folder mimicking the legitimate LogMeIn Hamachi installation, and persistence was achieved through a service masquerading as LogMeIn Hamachi, which was launched at system startup. After compromising the initial host, the attackers abused RDP to access a second server, logged in to an administrator account, and then deployed Deed RAT, likely as part of hands-on keyboard activity. Next, they used Impacket tools to compromise a third host. A month later, after the malware was removed from at least one host, the hackers accessed the initially compromised server and deployed the TernDoor backdoor, which was linked to Salt Typhoon by Cisco’s Talos security researchers. At the end of February, the APT accessed the victim organization’s environment again, attempting to redeploy Deed RAT using the same execution chain. “This intrusion should not be viewed as an isolated compromise, but as a sustained and adaptive operation conducted by an actor that repeatedly sought to regain and extend access within the victim environment. Across multiple waves of activity, the same access path was revisited, new payloads were introduced, and additional footholds were established,” Bitdefender notes. Twill Typhoon attacks Beginning September 2025 and continuing through at least April 2026, Darktrace observed the China-linked APT Twill Typhoon (also known as Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, and TA416) targeting entities in the Asia-Pacific and Japan (APJ) region with an updated arsenal, including a modular .NET-based RAT framework. Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs. The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading. During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components. The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality. The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands. “Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes. Related: Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking Related: China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks Related: Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says Related: FBI Warns of Data Security Risks From China-Made Mobile Apps WRITTEN BY Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Researcher Drops YellowKey, GreenPlasma Windows Zero-Days Government to Scrutinize Instructure Over Canvas Disruption, Data Breach 716,000 Impacted by OpenLoop Health Data Breach Fortinet, Ivanti Patch Critical Vulnerabilities Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities Microsoft Patches 137 Vulnerabilities Adobe Patches 52 Vulnerabilities in 10 Products White Circle Raises $11 Million for AI Control Platform Latest News Enhancing Data Center Security Without Sacrificing Performance New Linux Kernel Vulnerability Fragnesia Allows Root Privilege Escalation Mythos Proves Potent in Vulnerability Discovery, Less Convincing Elsewhere Akamai to Acquire AI and Browser Security Firm LayerX for $205 Million G7 Countries Release AI SBOM Guidance F5 Patches Over 50 Vulnerabilities Hackers Targeted PraisonAI Vulnerability Hours After Disclosure High-Severity Vulnerability Patched in VMware Fusion Trending Webinar: Third-Party Risk In Practice June 4, 2026 Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice. Register Virtual Event: Threat Detection And Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the Move Silvio Pappalardo has joined AuthMind as Chief Revenue Officer. iCOUNTER has appointed Lisa Hayashi as CMO and Bob Kalchthaler as CFO. Thomas Bain has been appointed Chief Marketing Officer at Silent Push. More People On The Move Expert Insights Enhancing Data Center Security Without Sacrificing Performance For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael) Is The SOC Obsolete, And We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents With Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win The Cyber War Without The Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    May 14, 2026
    Archived
    May 14, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗