Skip to main content

Disruption of Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan

Medium
Published: Tue May 13 2025 (05/13/2025, 18:41:56 UTC)
Source: AlienVault OTX

Description

Earth Ammit, a Chinese-linked threat actor, conducted two campaigns targeting drone supply chains in Taiwan and South Korea from 2023 to 2024. The VENOM campaign focused on software service providers using open-source tools, while TIDRONE targeted military industries with custom malware. Their tactics included supply chain attacks, credential theft, and cyberespionage. Victims spanned military, satellite, heavy industry, media, technology, and healthcare sectors. Earth Ammit's goal was to compromise trusted networks for downstream attacks. They employed evolving techniques like fiber-based evasion and custom backdoors CXCLNT and CLNTEND. The campaigns showed progression from broad, low-cost tools to tailored capabilities for sensitive targets.

AI-Powered Analysis

AILast updated: 06/19/2025, 17:33:53 UTC

Technical Analysis

The threat actor Earth Ammit, linked to Chinese state-sponsored activities, has executed coordinated multi-wave cyber campaigns targeting drone supply chains primarily in Taiwan and South Korea between 2023 and 2024. These campaigns, named VENOM and TIDRONE, represent a strategic effort to disrupt and infiltrate critical supply chains associated with drone manufacturing and military industries. The VENOM campaign leveraged open-source tools to compromise software service providers, enabling broad access to downstream targets through trusted networks. In contrast, the TIDRONE campaign employed custom malware specifically designed to target military sectors, demonstrating an evolution from generic to highly tailored attack methodologies. The threat actor utilized a variety of sophisticated tactics including supply chain attacks, credential theft, and cyberespionage to gain persistent access. Notably, they deployed custom backdoors such as CXCLNT and CLNTEND and employed fiber-based evasion techniques to avoid detection. The victim profile is diverse, spanning military, satellite, heavy industry, media, technology, and healthcare sectors, indicating a wide-reaching impact on critical infrastructure and strategic industries. The campaigns also incorporated multiple MITRE ATT&CK techniques such as T1583 (Acquire Infrastructure), T1003 (Credential Dumping), T1543 (Create or Modify System Process), T1190 (Exploit Public-Facing Application), and T1078 (Valid Accounts), among others, highlighting a comprehensive and multi-faceted approach to compromise and persistence. The progression from broad, low-cost tools to customized malware underscores the threat actor’s adaptability and focus on high-value targets within sensitive sectors.

Potential Impact

For European organizations, especially those involved in drone manufacturing, aerospace, defense, and critical infrastructure sectors, this threat poses significant risks. Although the campaigns have been observed primarily in Taiwan and South Korea, the tactics and malware used could be adapted or redirected towards European supply chains due to the globalized nature of technology and defense industries. Compromise of supply chain vendors or software service providers in Europe could lead to downstream infiltration of military and critical infrastructure networks, resulting in espionage, intellectual property theft, operational disruption, and potential sabotage. The use of custom backdoors and advanced evasion techniques increases the difficulty of detection and remediation, potentially allowing prolonged unauthorized access. Additionally, the targeting of healthcare and media sectors suggests a broader impact on societal functions and information integrity. The disruption of drone supply chains could impair European defense capabilities and technological competitiveness, while espionage could undermine national security and economic interests.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to supply chain security and advanced persistent threats. Specific recommendations include: 1) Conduct rigorous security assessments and continuous monitoring of all third-party vendors and software providers, focusing on those involved in drone, aerospace, and defense supply chains. 2) Employ advanced threat hunting techniques to detect custom backdoors like CXCLNT and CLNTEND, including behavioral analytics and network traffic analysis for fiber-based evasion indicators. 3) Enforce strict credential hygiene policies, including multi-factor authentication (MFA) and regular credential audits, to mitigate credential theft risks. 4) Implement application allowlisting and robust patch management to reduce the attack surface, especially for public-facing applications vulnerable to exploitation (T1190). 5) Utilize endpoint detection and response (EDR) solutions capable of identifying process creation anomalies (T1543), code injection (T1055), and lateral movement techniques (T1021). 6) Establish incident response plans specifically addressing supply chain compromise scenarios, including rapid isolation and forensic analysis capabilities. 7) Foster information sharing with national cybersecurity agencies and industry groups to stay informed on evolving tactics and indicators of compromise related to Earth Ammit activities.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_us/research/25/e/earth-ammit.html"]
Adversary

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0a1a7340a51dd9daabce4eccf32c48c7
MD5 of 5235fecd3e1449ba9f78a25ddb89948a638484411a7bf91af3bb4d1b159f255a
hash26ff6fac8ac83ece36b95442f5bb81ce
MD5 of 19bbc2daa05a0e932d72ecfa4e08282aa4a27becaabad03b8fc18bb85d37743a
hash30c0796aa5d7ba9ea3790a0210ec9840
MD5 of 8907907a571a90c28ae72c10945f626fd22a6f587f664a6b86ad3a8f344f1aae
hash5611da919b7909f3fcf07523baaca346
MD5 of 40bcd87bcd851c5c2d6e5c901c59312d480eed58b4ebb2981607c0d80c27b529
hash798a707e1abac44b0ad7b1114bcd10a6
MD5 of 1b08f1af849f34bd3eaf2c8a97100d1ac4d78ff4f1c82dbea9c618d2fcd7b4c8
hashc1ddc3f31686692aaadf3eea00b4f87e
MD5 of c3c4443c3fee858e71fb8017288d9f3b79b2ae0f3f37f93d373765261b299d46
hashc3d1f6d324a6184eb70f3fc139fdd96b
MD5 of 2f2d4cc6266fe1671fa03737059622e03466a80d43a0342bff21b73c7aa5419a
hash1539139a6e1031c24f3167948476fc287e34597a
SHA1 of 40bcd87bcd851c5c2d6e5c901c59312d480eed58b4ebb2981607c0d80c27b529
hash3324c28c27e4fac526e36224618f5866327f9a5d
SHA1 of 8907907a571a90c28ae72c10945f626fd22a6f587f664a6b86ad3a8f344f1aae
hash450911a5eab9ddef2a45f07b145abeb28c09742e
SHA1 of c3c4443c3fee858e71fb8017288d9f3b79b2ae0f3f37f93d373765261b299d46
hash6ab0e2ede4e0968eae2bdc63864971054a534f7b
SHA1 of 19bbc2daa05a0e932d72ecfa4e08282aa4a27becaabad03b8fc18bb85d37743a
hash6b55a1b5abc9cd9ebc6893cdf95669600bece112
SHA1 of 5235fecd3e1449ba9f78a25ddb89948a638484411a7bf91af3bb4d1b159f255a
hash92d28c4201e0d56c46b2d750aa25856f60f2facb
SHA1 of 1b08f1af849f34bd3eaf2c8a97100d1ac4d78ff4f1c82dbea9c618d2fcd7b4c8
hashd6743a4e7f559c8d09afa1c342cfce078851b3a9
SHA1 of 2f2d4cc6266fe1671fa03737059622e03466a80d43a0342bff21b73c7aa5419a
hash0d91dfd16175658da35e12cafc4f8aa22129b42b7170898148ad516836a3344f
hash0f26a1042a74d0990e53587f97c63450763fba4af39d635e29ddcf6b0091d8ea
hash19bbc2daa05a0e932d72ecfa4e08282aa4a27becaabad03b8fc18bb85d37743a
hash1b08f1af849f34bd3eaf2c8a97100d1ac4d78ff4f1c82dbea9c618d2fcd7b4c8
hash1f22be2bbe1bfcda58ed6b29b573d417fa94f4e10be0636ab4c364520cda748e
hash24fabd3a74c6d24acb7c7f6ed254df0ba125b321772abacb692be5b6c687e651
hash2f2d4cc6266fe1671fa03737059622e03466a80d43a0342bff21b73c7aa5419a
hash37949e1f0eabbf6726ba79a707a9b471ec1fa160080f9b1effd01ea35f795fd7
hash40bcd87bcd851c5c2d6e5c901c59312d480eed58b4ebb2981607c0d80c27b529
hash5235fecd3e1449ba9f78a25ddb89948a638484411a7bf91af3bb4d1b159f255a
hash589d4a751e079ec6792ccabc39df36c3d43a3a34376d38d2eec2e36e32b2c7aa
hash73372378dd3c5455b466a61d5807b903ed6c1d9284628b9b7480ccd49cc15635
hash74096848382ffb86a5ff0c7811b9867ad97f83d3f406b2c5aa9f357e1619fe21
hash827142f772c39bd7f4c468bcfc096ea857b4d2939c606460424af836a045f696
hash8907907a571a90c28ae72c10945f626fd22a6f587f664a6b86ad3a8f344f1aae
hashc3c4443c3fee858e71fb8017288d9f3b79b2ae0f3f37f93d373765261b299d46
hashdb600b0ae5f7bfc81518a6b83d0c5d73e1b230e7378aab70b4e98a32ab219a18
hashf13869390dda83d40960d4f8a6b438c5c4cd31b4d25def7726c2809ddc573dc7
hashf3897381b9a4723b5f1f621632b1d83d889721535f544a6c0f5b83f6ea3e50b3

Ip

ValueDescriptionCopy
ip103.61.139.60
CC=TW ASN=AS31972 emagine concept inc.
ip45.121.50.185
CC=TW ASN=AS31972 emagine concept inc.
ip45.121.50.30
CC=TW ASN=AS31972 emagine concept inc.

Domain

ValueDescriptionCopy
domainfghytr.com
domainfuckeveryday.life
domainac.metyp9.com
domainclient.wns.windowswns.com
domainserver.microsoftsvc.com
domainservice.symantecsecuritycloud.com
domaintime.vmwaresync.com

Threat ID: 682c99307960f6956616ac7c

Added to database: 5/20/2025, 3:01:04 PM

Last enriched: 6/19/2025, 5:33:53 PM

Last updated: 8/13/2025, 7:42:50 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats