Disruption of Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
Earth Ammit, a Chinese-linked threat actor, conducted two campaigns targeting drone supply chains in Taiwan and South Korea from 2023 to 2024. The VENOM campaign focused on software service providers using open-source tools, while TIDRONE targeted military industries with custom malware. Their tactics included supply chain attacks, credential theft, and cyberespionage. Victims spanned military, satellite, heavy industry, media, technology, and healthcare sectors. Earth Ammit's goal was to compromise trusted networks for downstream attacks. They employed evolving techniques like fiber-based evasion and custom backdoors CXCLNT and CLNTEND. The campaigns showed progression from broad, low-cost tools to tailored capabilities for sensitive targets.
AI Analysis
Technical Summary
The threat actor Earth Ammit, linked to Chinese state-sponsored activities, has executed coordinated multi-wave cyber campaigns targeting drone supply chains primarily in Taiwan and South Korea between 2023 and 2024. These campaigns, named VENOM and TIDRONE, represent a strategic effort to disrupt and infiltrate critical supply chains associated with drone manufacturing and military industries. The VENOM campaign leveraged open-source tools to compromise software service providers, enabling broad access to downstream targets through trusted networks. In contrast, the TIDRONE campaign employed custom malware specifically designed to target military sectors, demonstrating an evolution from generic to highly tailored attack methodologies. The threat actor utilized a variety of sophisticated tactics including supply chain attacks, credential theft, and cyberespionage to gain persistent access. Notably, they deployed custom backdoors such as CXCLNT and CLNTEND and employed fiber-based evasion techniques to avoid detection. The victim profile is diverse, spanning military, satellite, heavy industry, media, technology, and healthcare sectors, indicating a wide-reaching impact on critical infrastructure and strategic industries. The campaigns also incorporated multiple MITRE ATT&CK techniques such as T1583 (Acquire Infrastructure), T1003 (Credential Dumping), T1543 (Create or Modify System Process), T1190 (Exploit Public-Facing Application), and T1078 (Valid Accounts), among others, highlighting a comprehensive and multi-faceted approach to compromise and persistence. The progression from broad, low-cost tools to customized malware underscores the threat actor’s adaptability and focus on high-value targets within sensitive sectors.
Potential Impact
For European organizations, especially those involved in drone manufacturing, aerospace, defense, and critical infrastructure sectors, this threat poses significant risks. Although the campaigns have been observed primarily in Taiwan and South Korea, the tactics and malware used could be adapted or redirected towards European supply chains due to the globalized nature of technology and defense industries. Compromise of supply chain vendors or software service providers in Europe could lead to downstream infiltration of military and critical infrastructure networks, resulting in espionage, intellectual property theft, operational disruption, and potential sabotage. The use of custom backdoors and advanced evasion techniques increases the difficulty of detection and remediation, potentially allowing prolonged unauthorized access. Additionally, the targeting of healthcare and media sectors suggests a broader impact on societal functions and information integrity. The disruption of drone supply chains could impair European defense capabilities and technological competitiveness, while espionage could undermine national security and economic interests.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to supply chain security and advanced persistent threats. Specific recommendations include: 1) Conduct rigorous security assessments and continuous monitoring of all third-party vendors and software providers, focusing on those involved in drone, aerospace, and defense supply chains. 2) Employ advanced threat hunting techniques to detect custom backdoors like CXCLNT and CLNTEND, including behavioral analytics and network traffic analysis for fiber-based evasion indicators. 3) Enforce strict credential hygiene policies, including multi-factor authentication (MFA) and regular credential audits, to mitigate credential theft risks. 4) Implement application allowlisting and robust patch management to reduce the attack surface, especially for public-facing applications vulnerable to exploitation (T1190). 5) Utilize endpoint detection and response (EDR) solutions capable of identifying process creation anomalies (T1543), code injection (T1055), and lateral movement techniques (T1021). 6) Establish incident response plans specifically addressing supply chain compromise scenarios, including rapid isolation and forensic analysis capabilities. 7) Foster information sharing with national cybersecurity agencies and industry groups to stay informed on evolving tactics and indicators of compromise related to Earth Ammit activities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Sweden, Finland, Belgium
Indicators of Compromise
- hash: 0a1a7340a51dd9daabce4eccf32c48c7
- hash: 26ff6fac8ac83ece36b95442f5bb81ce
- hash: 30c0796aa5d7ba9ea3790a0210ec9840
- hash: 5611da919b7909f3fcf07523baaca346
- hash: 798a707e1abac44b0ad7b1114bcd10a6
- hash: c1ddc3f31686692aaadf3eea00b4f87e
- hash: c3d1f6d324a6184eb70f3fc139fdd96b
- hash: 1539139a6e1031c24f3167948476fc287e34597a
- hash: 3324c28c27e4fac526e36224618f5866327f9a5d
- hash: 450911a5eab9ddef2a45f07b145abeb28c09742e
- hash: 6ab0e2ede4e0968eae2bdc63864971054a534f7b
- hash: 6b55a1b5abc9cd9ebc6893cdf95669600bece112
- hash: 92d28c4201e0d56c46b2d750aa25856f60f2facb
- hash: d6743a4e7f559c8d09afa1c342cfce078851b3a9
- hash: 0d91dfd16175658da35e12cafc4f8aa22129b42b7170898148ad516836a3344f
- hash: 0f26a1042a74d0990e53587f97c63450763fba4af39d635e29ddcf6b0091d8ea
- hash: 19bbc2daa05a0e932d72ecfa4e08282aa4a27becaabad03b8fc18bb85d37743a
- hash: 1b08f1af849f34bd3eaf2c8a97100d1ac4d78ff4f1c82dbea9c618d2fcd7b4c8
- hash: 1f22be2bbe1bfcda58ed6b29b573d417fa94f4e10be0636ab4c364520cda748e
- hash: 24fabd3a74c6d24acb7c7f6ed254df0ba125b321772abacb692be5b6c687e651
- hash: 2f2d4cc6266fe1671fa03737059622e03466a80d43a0342bff21b73c7aa5419a
- hash: 37949e1f0eabbf6726ba79a707a9b471ec1fa160080f9b1effd01ea35f795fd7
- hash: 40bcd87bcd851c5c2d6e5c901c59312d480eed58b4ebb2981607c0d80c27b529
- hash: 5235fecd3e1449ba9f78a25ddb89948a638484411a7bf91af3bb4d1b159f255a
- hash: 589d4a751e079ec6792ccabc39df36c3d43a3a34376d38d2eec2e36e32b2c7aa
- hash: 73372378dd3c5455b466a61d5807b903ed6c1d9284628b9b7480ccd49cc15635
- hash: 74096848382ffb86a5ff0c7811b9867ad97f83d3f406b2c5aa9f357e1619fe21
- hash: 827142f772c39bd7f4c468bcfc096ea857b4d2939c606460424af836a045f696
- hash: 8907907a571a90c28ae72c10945f626fd22a6f587f664a6b86ad3a8f344f1aae
- hash: c3c4443c3fee858e71fb8017288d9f3b79b2ae0f3f37f93d373765261b299d46
- hash: db600b0ae5f7bfc81518a6b83d0c5d73e1b230e7378aab70b4e98a32ab219a18
- hash: f13869390dda83d40960d4f8a6b438c5c4cd31b4d25def7726c2809ddc573dc7
- hash: f3897381b9a4723b5f1f621632b1d83d889721535f544a6c0f5b83f6ea3e50b3
- ip: 103.61.139.60
- ip: 45.121.50.185
- ip: 45.121.50.30
- domain: fghytr.com
- domain: fuckeveryday.life
- domain: ac.metyp9.com
- domain: client.wns.windowswns.com
- domain: server.microsoftsvc.com
- domain: service.symantecsecuritycloud.com
- domain: time.vmwaresync.com
Disruption of Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
Description
Earth Ammit, a Chinese-linked threat actor, conducted two campaigns targeting drone supply chains in Taiwan and South Korea from 2023 to 2024. The VENOM campaign focused on software service providers using open-source tools, while TIDRONE targeted military industries with custom malware. Their tactics included supply chain attacks, credential theft, and cyberespionage. Victims spanned military, satellite, heavy industry, media, technology, and healthcare sectors. Earth Ammit's goal was to compromise trusted networks for downstream attacks. They employed evolving techniques like fiber-based evasion and custom backdoors CXCLNT and CLNTEND. The campaigns showed progression from broad, low-cost tools to tailored capabilities for sensitive targets.
AI-Powered Analysis
Technical Analysis
The threat actor Earth Ammit, linked to Chinese state-sponsored activities, has executed coordinated multi-wave cyber campaigns targeting drone supply chains primarily in Taiwan and South Korea between 2023 and 2024. These campaigns, named VENOM and TIDRONE, represent a strategic effort to disrupt and infiltrate critical supply chains associated with drone manufacturing and military industries. The VENOM campaign leveraged open-source tools to compromise software service providers, enabling broad access to downstream targets through trusted networks. In contrast, the TIDRONE campaign employed custom malware specifically designed to target military sectors, demonstrating an evolution from generic to highly tailored attack methodologies. The threat actor utilized a variety of sophisticated tactics including supply chain attacks, credential theft, and cyberespionage to gain persistent access. Notably, they deployed custom backdoors such as CXCLNT and CLNTEND and employed fiber-based evasion techniques to avoid detection. The victim profile is diverse, spanning military, satellite, heavy industry, media, technology, and healthcare sectors, indicating a wide-reaching impact on critical infrastructure and strategic industries. The campaigns also incorporated multiple MITRE ATT&CK techniques such as T1583 (Acquire Infrastructure), T1003 (Credential Dumping), T1543 (Create or Modify System Process), T1190 (Exploit Public-Facing Application), and T1078 (Valid Accounts), among others, highlighting a comprehensive and multi-faceted approach to compromise and persistence. The progression from broad, low-cost tools to customized malware underscores the threat actor’s adaptability and focus on high-value targets within sensitive sectors.
Potential Impact
For European organizations, especially those involved in drone manufacturing, aerospace, defense, and critical infrastructure sectors, this threat poses significant risks. Although the campaigns have been observed primarily in Taiwan and South Korea, the tactics and malware used could be adapted or redirected towards European supply chains due to the globalized nature of technology and defense industries. Compromise of supply chain vendors or software service providers in Europe could lead to downstream infiltration of military and critical infrastructure networks, resulting in espionage, intellectual property theft, operational disruption, and potential sabotage. The use of custom backdoors and advanced evasion techniques increases the difficulty of detection and remediation, potentially allowing prolonged unauthorized access. Additionally, the targeting of healthcare and media sectors suggests a broader impact on societal functions and information integrity. The disruption of drone supply chains could impair European defense capabilities and technological competitiveness, while espionage could undermine national security and economic interests.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to supply chain security and advanced persistent threats. Specific recommendations include: 1) Conduct rigorous security assessments and continuous monitoring of all third-party vendors and software providers, focusing on those involved in drone, aerospace, and defense supply chains. 2) Employ advanced threat hunting techniques to detect custom backdoors like CXCLNT and CLNTEND, including behavioral analytics and network traffic analysis for fiber-based evasion indicators. 3) Enforce strict credential hygiene policies, including multi-factor authentication (MFA) and regular credential audits, to mitigate credential theft risks. 4) Implement application allowlisting and robust patch management to reduce the attack surface, especially for public-facing applications vulnerable to exploitation (T1190). 5) Utilize endpoint detection and response (EDR) solutions capable of identifying process creation anomalies (T1543), code injection (T1055), and lateral movement techniques (T1021). 6) Establish incident response plans specifically addressing supply chain compromise scenarios, including rapid isolation and forensic analysis capabilities. 7) Foster information sharing with national cybersecurity agencies and industry groups to stay informed on evolving tactics and indicators of compromise related to Earth Ammit activities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.trendmicro.com/en_us/research/25/e/earth-ammit.html"]
- Adversary
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash0a1a7340a51dd9daabce4eccf32c48c7 | MD5 of 5235fecd3e1449ba9f78a25ddb89948a638484411a7bf91af3bb4d1b159f255a | |
hash26ff6fac8ac83ece36b95442f5bb81ce | MD5 of 19bbc2daa05a0e932d72ecfa4e08282aa4a27becaabad03b8fc18bb85d37743a | |
hash30c0796aa5d7ba9ea3790a0210ec9840 | MD5 of 8907907a571a90c28ae72c10945f626fd22a6f587f664a6b86ad3a8f344f1aae | |
hash5611da919b7909f3fcf07523baaca346 | MD5 of 40bcd87bcd851c5c2d6e5c901c59312d480eed58b4ebb2981607c0d80c27b529 | |
hash798a707e1abac44b0ad7b1114bcd10a6 | MD5 of 1b08f1af849f34bd3eaf2c8a97100d1ac4d78ff4f1c82dbea9c618d2fcd7b4c8 | |
hashc1ddc3f31686692aaadf3eea00b4f87e | MD5 of c3c4443c3fee858e71fb8017288d9f3b79b2ae0f3f37f93d373765261b299d46 | |
hashc3d1f6d324a6184eb70f3fc139fdd96b | MD5 of 2f2d4cc6266fe1671fa03737059622e03466a80d43a0342bff21b73c7aa5419a | |
hash1539139a6e1031c24f3167948476fc287e34597a | SHA1 of 40bcd87bcd851c5c2d6e5c901c59312d480eed58b4ebb2981607c0d80c27b529 | |
hash3324c28c27e4fac526e36224618f5866327f9a5d | SHA1 of 8907907a571a90c28ae72c10945f626fd22a6f587f664a6b86ad3a8f344f1aae | |
hash450911a5eab9ddef2a45f07b145abeb28c09742e | SHA1 of c3c4443c3fee858e71fb8017288d9f3b79b2ae0f3f37f93d373765261b299d46 | |
hash6ab0e2ede4e0968eae2bdc63864971054a534f7b | SHA1 of 19bbc2daa05a0e932d72ecfa4e08282aa4a27becaabad03b8fc18bb85d37743a | |
hash6b55a1b5abc9cd9ebc6893cdf95669600bece112 | SHA1 of 5235fecd3e1449ba9f78a25ddb89948a638484411a7bf91af3bb4d1b159f255a | |
hash92d28c4201e0d56c46b2d750aa25856f60f2facb | SHA1 of 1b08f1af849f34bd3eaf2c8a97100d1ac4d78ff4f1c82dbea9c618d2fcd7b4c8 | |
hashd6743a4e7f559c8d09afa1c342cfce078851b3a9 | SHA1 of 2f2d4cc6266fe1671fa03737059622e03466a80d43a0342bff21b73c7aa5419a | |
hash0d91dfd16175658da35e12cafc4f8aa22129b42b7170898148ad516836a3344f | — | |
hash0f26a1042a74d0990e53587f97c63450763fba4af39d635e29ddcf6b0091d8ea | — | |
hash19bbc2daa05a0e932d72ecfa4e08282aa4a27becaabad03b8fc18bb85d37743a | — | |
hash1b08f1af849f34bd3eaf2c8a97100d1ac4d78ff4f1c82dbea9c618d2fcd7b4c8 | — | |
hash1f22be2bbe1bfcda58ed6b29b573d417fa94f4e10be0636ab4c364520cda748e | — | |
hash24fabd3a74c6d24acb7c7f6ed254df0ba125b321772abacb692be5b6c687e651 | — | |
hash2f2d4cc6266fe1671fa03737059622e03466a80d43a0342bff21b73c7aa5419a | — | |
hash37949e1f0eabbf6726ba79a707a9b471ec1fa160080f9b1effd01ea35f795fd7 | — | |
hash40bcd87bcd851c5c2d6e5c901c59312d480eed58b4ebb2981607c0d80c27b529 | — | |
hash5235fecd3e1449ba9f78a25ddb89948a638484411a7bf91af3bb4d1b159f255a | — | |
hash589d4a751e079ec6792ccabc39df36c3d43a3a34376d38d2eec2e36e32b2c7aa | — | |
hash73372378dd3c5455b466a61d5807b903ed6c1d9284628b9b7480ccd49cc15635 | — | |
hash74096848382ffb86a5ff0c7811b9867ad97f83d3f406b2c5aa9f357e1619fe21 | — | |
hash827142f772c39bd7f4c468bcfc096ea857b4d2939c606460424af836a045f696 | — | |
hash8907907a571a90c28ae72c10945f626fd22a6f587f664a6b86ad3a8f344f1aae | — | |
hashc3c4443c3fee858e71fb8017288d9f3b79b2ae0f3f37f93d373765261b299d46 | — | |
hashdb600b0ae5f7bfc81518a6b83d0c5d73e1b230e7378aab70b4e98a32ab219a18 | — | |
hashf13869390dda83d40960d4f8a6b438c5c4cd31b4d25def7726c2809ddc573dc7 | — | |
hashf3897381b9a4723b5f1f621632b1d83d889721535f544a6c0f5b83f6ea3e50b3 | — |
Ip
Value | Description | Copy |
---|---|---|
ip103.61.139.60 | CC=TW ASN=AS31972 emagine concept inc. | |
ip45.121.50.185 | CC=TW ASN=AS31972 emagine concept inc. | |
ip45.121.50.30 | CC=TW ASN=AS31972 emagine concept inc. |
Domain
Value | Description | Copy |
---|---|---|
domainfghytr.com | — | |
domainfuckeveryday.life | — | |
domainac.metyp9.com | — | |
domainclient.wns.windowswns.com | — | |
domainserver.microsoftsvc.com | — | |
domainservice.symantecsecuritycloud.com | — | |
domaintime.vmwaresync.com | — |
Threat ID: 682c99307960f6956616ac7c
Added to database: 5/20/2025, 3:01:04 PM
Last enriched: 6/19/2025, 5:33:53 PM
Last updated: 8/13/2025, 7:42:50 AM
Views: 14
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.