China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
Cybersecurity researchers have discovered a JScript-based command-and-control (C2) framework called PeckBirdy that has been put to use by China-aligned APT actors since 2023 to target multiple environments. The flexible framework has been put to use against Chinese gambling industries and malicious activities targeting Asian government entities and private organizations, according to Trend Micro
AI Analysis
Technical Summary
PeckBirdy is a sophisticated, script-based command-and-control (C2) framework implemented in JScript, designed for flexibility and stealth by leveraging living-off-the-land binaries (LOLBins) such as MSHTA, WScript, and Classic ASP. Discovered by Trend Micro in 2023, it has been used by China-aligned advanced persistent threat (APT) actors in campaigns dubbed SHADOW-VOID-044 and SHADOW-EARTH-045. The framework targets multiple environments, including web browsers, Node.js, and .NET environments, allowing it to execute malicious payloads dynamically without leaving persistent files, complicating detection. PeckBirdy supports multiple communication protocols, primarily WebSocket, with fallbacks like Adobe Flash ActiveX and Comet, enabling robust C2 communications. It uses unique attack and victim IDs to manage sessions and deliver second-stage scripts capable of stealing cookies, delivering backdoors, and establishing reverse shells. Notably, the framework has been used to inject malicious scripts into Chinese gambling websites and Asian government portals, including a Philippine educational institution, to harvest credentials and facilitate lateral movement. The attackers employ social engineering tactics such as fake Google Chrome update pages to trick victims into executing malware. The infrastructure analysis revealed modular backdoors HOLODONUT (.NET-based) and MKDOOR, capable of loading and unloading plugins remotely, enhancing operational flexibility. The presence of other malware artifacts and infrastructure overlaps with known Chinese APT groups (e.g., UNC3569, Earth Lusca, APT41) supports attribution to state-sponsored actors. The use of a 2020 Chrome V8 engine exploit (CVE-2020-16040) and Cobalt Strike tools further demonstrates the advanced capabilities of these campaigns. The dynamic nature of PeckBirdy, combined with its use of legitimate system tools and runtime code injection, poses significant detection challenges for traditional endpoint security solutions.
Potential Impact
For European organizations, the PeckBirdy framework represents a significant threat, particularly for entities with business or governmental ties to Asia or those operating in sectors targeted by the campaigns, such as gambling, education, and government services. The framework's ability to evade detection by abusing legitimate system binaries and dynamically injecting code increases the risk of prolonged undetected intrusions, leading to credential theft, unauthorized access, data exfiltration, and lateral movement within networks. The modular backdoors HOLODONUT and MKDOOR enable attackers to customize payloads and maintain persistent access, potentially compromising sensitive information and critical infrastructure. The use of social engineering to deliver malware increases the likelihood of successful initial compromise. European organizations relying on web technologies, especially those hosting public-facing web portals or using Node.js and .NET environments, are at heightened risk. Additionally, the exploitation of known vulnerabilities, even if patched, suggests that unpatched systems remain vulnerable. The stealthy nature of the threat complicates incident response and remediation efforts, potentially leading to operational disruptions and reputational damage.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to detect and mitigate living-off-the-land (LOLBin) abuse and script-based attacks. Specific recommendations include: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of monitoring script execution, especially JScript and MSHTA activities, and flagging anomalous use of LOLBins. 2) Implement strict application whitelisting and execution policies to restrict unauthorized script execution and the use of system binaries for non-standard purposes. 3) Conduct regular patching of all software, prioritizing browsers (e.g., Google Chrome), runtime engines (e.g., V8), and server-side platforms (Node.js, .NET) to close known vulnerabilities like CVE-2020-16040. 4) Enhance network monitoring to detect unusual WebSocket, HTTP(S), and fallback communication patterns indicative of C2 traffic, including connections to suspicious domains or IPs linked to known campaigns. 5) Employ web application firewalls (WAFs) and content security policies (CSP) to prevent script injection attacks on public-facing websites. 6) Train users to recognize social engineering attempts, such as fake software update prompts, and establish strict policies for software updates through official channels only. 7) Conduct threat hunting exercises focused on identifying indicators of compromise related to PeckBirdy, HOLODONUT, and MKDOOR, including unusual process spawning and network connections. 8) Segment networks to limit lateral movement opportunities and implement strong credential management practices, including multi-factor authentication (MFA). 9) Collaborate with threat intelligence providers to stay updated on emerging indicators and tactics related to these campaigns. 10) Review and harden server configurations to prevent unauthorized script injections, especially on government and educational institution portals.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Belgium, Poland, Sweden, Ireland
China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
Description
Cybersecurity researchers have discovered a JScript-based command-and-control (C2) framework called PeckBirdy that has been put to use by China-aligned APT actors since 2023 to target multiple environments. The flexible framework has been put to use against Chinese gambling industries and malicious activities targeting Asian government entities and private organizations, according to Trend Micro
AI-Powered Analysis
Technical Analysis
PeckBirdy is a sophisticated, script-based command-and-control (C2) framework implemented in JScript, designed for flexibility and stealth by leveraging living-off-the-land binaries (LOLBins) such as MSHTA, WScript, and Classic ASP. Discovered by Trend Micro in 2023, it has been used by China-aligned advanced persistent threat (APT) actors in campaigns dubbed SHADOW-VOID-044 and SHADOW-EARTH-045. The framework targets multiple environments, including web browsers, Node.js, and .NET environments, allowing it to execute malicious payloads dynamically without leaving persistent files, complicating detection. PeckBirdy supports multiple communication protocols, primarily WebSocket, with fallbacks like Adobe Flash ActiveX and Comet, enabling robust C2 communications. It uses unique attack and victim IDs to manage sessions and deliver second-stage scripts capable of stealing cookies, delivering backdoors, and establishing reverse shells. Notably, the framework has been used to inject malicious scripts into Chinese gambling websites and Asian government portals, including a Philippine educational institution, to harvest credentials and facilitate lateral movement. The attackers employ social engineering tactics such as fake Google Chrome update pages to trick victims into executing malware. The infrastructure analysis revealed modular backdoors HOLODONUT (.NET-based) and MKDOOR, capable of loading and unloading plugins remotely, enhancing operational flexibility. The presence of other malware artifacts and infrastructure overlaps with known Chinese APT groups (e.g., UNC3569, Earth Lusca, APT41) supports attribution to state-sponsored actors. The use of a 2020 Chrome V8 engine exploit (CVE-2020-16040) and Cobalt Strike tools further demonstrates the advanced capabilities of these campaigns. The dynamic nature of PeckBirdy, combined with its use of legitimate system tools and runtime code injection, poses significant detection challenges for traditional endpoint security solutions.
Potential Impact
For European organizations, the PeckBirdy framework represents a significant threat, particularly for entities with business or governmental ties to Asia or those operating in sectors targeted by the campaigns, such as gambling, education, and government services. The framework's ability to evade detection by abusing legitimate system binaries and dynamically injecting code increases the risk of prolonged undetected intrusions, leading to credential theft, unauthorized access, data exfiltration, and lateral movement within networks. The modular backdoors HOLODONUT and MKDOOR enable attackers to customize payloads and maintain persistent access, potentially compromising sensitive information and critical infrastructure. The use of social engineering to deliver malware increases the likelihood of successful initial compromise. European organizations relying on web technologies, especially those hosting public-facing web portals or using Node.js and .NET environments, are at heightened risk. Additionally, the exploitation of known vulnerabilities, even if patched, suggests that unpatched systems remain vulnerable. The stealthy nature of the threat complicates incident response and remediation efforts, potentially leading to operational disruptions and reputational damage.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to detect and mitigate living-off-the-land (LOLBin) abuse and script-based attacks. Specific recommendations include: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of monitoring script execution, especially JScript and MSHTA activities, and flagging anomalous use of LOLBins. 2) Implement strict application whitelisting and execution policies to restrict unauthorized script execution and the use of system binaries for non-standard purposes. 3) Conduct regular patching of all software, prioritizing browsers (e.g., Google Chrome), runtime engines (e.g., V8), and server-side platforms (Node.js, .NET) to close known vulnerabilities like CVE-2020-16040. 4) Enhance network monitoring to detect unusual WebSocket, HTTP(S), and fallback communication patterns indicative of C2 traffic, including connections to suspicious domains or IPs linked to known campaigns. 5) Employ web application firewalls (WAFs) and content security policies (CSP) to prevent script injection attacks on public-facing websites. 6) Train users to recognize social engineering attempts, such as fake software update prompts, and establish strict policies for software updates through official channels only. 7) Conduct threat hunting exercises focused on identifying indicators of compromise related to PeckBirdy, HOLODONUT, and MKDOOR, including unusual process spawning and network connections. 8) Segment networks to limit lateral movement opportunities and implement strong credential management practices, including multi-factor authentication (MFA). 9) Collaborate with threat intelligence providers to stay updated on emerging indicators and tactics related to these campaigns. 10) Review and harden server configurations to prevent unauthorized script injections, especially on government and educational institution portals.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/china-linked-hackers-have-used.html","fetched":true,"fetchedAt":"2026-01-27T20:26:48.349Z","wordCount":1465}
Threat ID: 69791f8b4623b1157c45d42b
Added to database: 1/27/2026, 8:26:51 PM
Last enriched: 1/27/2026, 8:28:42 PM
Last updated: 2/7/2026, 4:42:30 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2073: SQL Injection in itsourcecode School Management System
MediumCVE-2025-31990: CWE-770 Allocation of Resources Without Limits or Throttling in HCLSoftware HCL DevOps Velocity
MediumCVE-2026-2069: Stack-based Buffer Overflow in ggml-org llama.cpp
MediumCVE-2026-25760: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BishopFox sliver
MediumCVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.