CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 15, 2026

Chinese APT Hackers Exploit Microsoft Exchange to Breach Energy Sector Network

Cybersecurity News Archived May 15, 2026 ✓ Full text saved

A Chinese state-linked hacking group known as FamousSparrow has quietly infiltrated an Azerbaijani oil and gas company, exploiting an unpatched Microsoft Exchange server to plant multiple backdoors inside the network. The attack ran from late December 2025 through late February 2026 and stands as one of the most detailed Chinese APT intrusions targeting energy infrastructure […] The post Chinese APT Hackers Exploit Microsoft Exchange to Breach Energy Sector Network appeared first on Cyber Securi

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News Chinese APT Hackers Exploit Microsoft Exchange to Breach Energy Sector Network By Tushar Subhra Dutta May 14, 2026 A Chinese state-linked hacking group known as FamousSparrow has quietly infiltrated an Azerbaijani oil and gas company, exploiting an unpatched Microsoft Exchange server to plant multiple backdoors inside the network. The attack ran from late December 2025 through late February 2026 and stands as one of the most detailed Chinese APT intrusions targeting energy infrastructure in the South Caucasus ever documented. The threat group did not stop at one attempt. Attackers returned to the same compromised Exchange server three separate times, swapping malware families between visits and adjusting their tactics each time defenders tried to remove them. That persistence signals a deliberate, sustained espionage campaign rather than an opportunistic breach. Researchers at Bitdefender, who tracked the operation across all three activity waves, attributed the intrusion to FamousSparrow with moderate-to-high confidence, noting significant overlap with the Earth Estries threat cluster. Evolution in the Deed RAT toolchain (Source – Bitdefender) The timing is no coincidence. Azerbaijan has grown into a critical gas supplier for Europe after Russia’s Ukraine transit deal expired in 2024 and Strait of Hormuz disruptions in early 2026 reduced alternative energy sources. Chinese APT Hackers Exploit Microsoft Exchange The operation deployed two distinct backdoor families, Deed RAT and Terndoor, across different stages. Attackers also introduced an evolved DLL sideloading technique engineered to defeat automated security analysis, a level of sophistication rarely seen in prior campaigns tied to these malware families. What followed was a layered operation that expanded analyst understanding of this group’s reach into energy targets. The earliest signs of the intrusion date to December 25, 2025, when the Microsoft Exchange IIS worker process attempted to write a web shell into a publicly accessible directory on the server. This action leveraged the ProxyNotShell exploit chain, two vulnerabilities tracked as CVE-2022-41040 and CVE-2022-41082 that allow unauthenticated remote code execution on unpatched Exchange servers. In the days that followed, attackers dropped additional web shells with filenames such as key.aspx, log.aspx, errorFE_.aspx, and signout_.aspx. These provided a reliable foothold for issuing commands and staging further payloads. A three-component malware chain was then deployed using files disguised as the legitimate LogMeIn Hamachi VPN application to reduce suspicion. The loader file, LMIGuardianDll.dll, was placed alongside a genuine LogMeIn binary and sideloaded during normal startup. The Deed RAT payload was stored in an encrypted file named .hamachi.lng, decrypted in memory using AES-128 and RC4. A Windows service mimicking LogMeIn Hamachi was also created to auto-launch the malware on every restart, locking in persistent access. Advanced Evasion and Multi-Wave Persistence What sets this campaign apart is the evolved DLL sideloading technique used to hide the Deed RAT loader. Unlike typical sideloading that triggers malicious code the moment a DLL is loaded, this version split its logic across two export functions named Init and ComMain. The payload only runs after the host application follows a specific internal sequence of calls, meaning a sandbox examining the file in isolation sees no malicious behavior at all. winMain flow of LMIGuardianSvc.exe (Source – Bitdefender) This design gates the infection behind a legitimate execution path. Security tools that inspect only portions of code find nothing to flag, and the full attack behavior is only visible when the application runs exactly as expected. That makes this sample significantly harder to detect during automated triage. In the second wave, the group deployed a backdoor called Terndoor by hijacking the legitimate deskband_injector64.exe binary. The attempt was blocked, but forensic artifacts confirmed the malware had tried to install a kernel driver. The third wave brought back a modified Deed RAT using sentinelonepro[.]com as its command-and-control address, impersonating a well-known security vendor to avoid detection in network logs. Security teams should apply all available Exchange patches and rotate any exposed credentials without delay. Monitoring should cover web shell writes through the IIS worker process, unsigned binaries patching Windows API functions in memory, and outbound HTTPS traffic to domains impersonating security vendors. Unexpected RDP sessions using domain administrator accounts, followed quickly by PowerShell activity and new file downloads, should be treated as high-priority alerts. Indicators of Compromise (IoCs):- Type Indicator Description MD5 Hash 0554f3b69d39d175dd110d765c11347a LMIGuardianSvc.exe — legitimate LogMeIn Hamachi binary used in Wave 1 sideloading chain MD5 Hash 762f787534a891eca8aa9b41330b4108 USOShared.exe — renamed copy of deskband_injector64.exe used in Wave 2 File Name LMIGuardianDll.dll Malicious DLL loader sideloaded by LMIGuardianSvc.exe; deploys Deed RAT File Name .hamachi.lng Encrypted Deed RAT payload, AES-128 + RC4 decrypted in memory File Name lmiguardiandll.dll Alternate-casing malicious loader variant observed in initial Exchange exploitation stage File Name key.aspx Web shell dropped via ProxyNotShell exploit on Exchange server File Name log.aspx Web shell dropped via ProxyNotShell exploit on Exchange server File Name errorFE_.aspx Web shell dropped via ProxyNotShell exploit on Exchange server File Name signout_.aspx Web shell dropped via ProxyNotShell exploit on Exchange server File Name winmm.dll Malicious loader DLL used in Wave 2 Terndoor sideloading chain File Name vmflt.sys Driver that Terndoor malware attempted to install for kernel-level persistence File Name cache.dat Assessed payload container associated with Terndoor deployment Registry Key HKLM\SYSTEM\ControlSet001\Services\vmflt Registry entries created by Terndoor to register kernel driver service Domain (C2) virusblocker[.]it[.]com:443 Command-and-control address used by Wave 1 Deed RAT variant Domain (C2) sentinelonepro[.]com:443 Command-and-control address used by Wave 3 modified Deed RAT variant Domain ipinfo[.]io Legitimate service contacted by Wave 2 malware for network reconnaissance CVE CVE-2022-41040 ProxyNotShell Exchange vulnerability exploited for initial access CVE CVE-2022-41082 ProxyNotShell Exchange vulnerability exploited for initial access Magic Value 0xFF66ABCD Updated Deed RAT module magic value (replaces 0xDEED4554 in older variants) File Path C:\Recovery File storage path used by Wave 3 Deed RAT components File Path C:\ProgramData\USOShared File storage path used by Wave 2 Terndoor components File Path C:\TEMP\LMIGuardianSvc.exe Initial staging path for Wave 1 Deed RAT loader File Path C:\Program Files (x86)\LogMeIn Hamachi\ Final installation path mimicking legitimate LogMeIn Hamachi software Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM. Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google. Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Tushar Subhra Dutta Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics. Trending News node-ipc npm Package with 822K Weekly Downloads Compromised in Supply Chain Attack Seedworm APT Abuses Signed Fortemedia and SentinelOne Binaries for DLL Sideloading Vidar Malware Targets Browser Credentials, Cookies, Crypto Wallets, and System Data Microsoft Patch Tuesday May 2026 – 120 Vulnerabilities Fixed, Including 29 Critical RCE Flaws Microsoft Research Shows AI Can Generate Realistic Command Lines and Process Telemetry Latest News Cyber Attack News node-ipc npm Package with 822K Weekly Downloads Compromised in Supply Chain Attack Cyber Security News Anthropic’s Mythos AI Reportedly Found macOS Vulnerabilities that Could Bypass Apple Security Cyber Security News Hackers Compromise 170 npm Packages to Steal GitHub, npm, AWS, and Kubernetes Secrets Cyber Security News Critical Canon MailSuite Vulnerability Enables Remote Code Execution Attacks Cyber Security News TeamPCP and BreachForums Hackers Running $1,000 Contest for Supply Chain Attacks
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 15, 2026
    Archived
    May 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗