From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. entities that are linked to or involved in policy issues. The organization, according to a report from Broadcom's Symantec and Carbon Black teams, is "active in attempting to influence U.S. government
AI Analysis
Technical Summary
This threat involves a China-linked advanced persistent threat (APT) actor leveraging a range of legacy vulnerabilities and misconfigurations to conduct cyber espionage and establish persistent footholds in targeted networks. The initial intrusion was detected in April 2025 against a U.S. non-profit organization engaged in policy influence, using mass scanning and exploitation of known CVEs such as CVE-2022-26134 (Atlassian), CVE-2021-44228 (Apache Log4j), CVE-2017-9805 (Apache Struts), and CVE-2017-17562 (GoAhead Web Server). Post-compromise actions included executing network reconnaissance commands (curl, netstat), creating scheduled tasks to run legitimate Microsoft binaries (msbuild.exe) for payload execution, and injecting code into csc.exe to communicate with a command-and-control server. The attackers deployed remote access trojans (RATs) in memory and used DLL sideloading techniques with legitimate antivirus components (Vipre’s vetysafe.exe) to evade detection. Tools such as Dcsync and Imjpuexc were observed, indicating attempts to harvest credentials and escalate privileges. The attackers targeted domain controllers to enable lateral movement and network-wide compromise. The campaign is linked to multiple Chinese APT groups, including Salt Typhoon (Earth Estries), Earth Longzhi, Space Pirates, and Kelp, who share tooling and techniques. Additional activity includes exploitation of WinRAR vulnerabilities (CVE-2025-8088) and IIS server compromises using publicly exposed ASP.NET machine keys to deploy the TOLLBOOTH backdoor with SEO cloaking and web shell capabilities. These IIS attacks enable unauthenticated remote command execution and use rootkits like HIDDENDRIVER to maintain stealth. Broader Chinese cyber campaigns also target sectors across Asia, Europe, Latin America, and the U.S., employing phishing, adversary-in-the-middle attacks, and DNS hijacking to deliver malware such as BLOODALCHEMY, WinDealer, and SlowStepper. The shared use of tools and overlapping tactics among Chinese groups complicates attribution and defense efforts.
Potential Impact
European organizations face significant risks from this threat due to the widespread use of affected legacy software and IIS servers across the continent. Successful exploitation can lead to unauthorized access, credential theft, and establishment of persistent backdoors, enabling espionage, data exfiltration, and potential disruption of critical services. Targeting domain controllers threatens the integrity and availability of entire networks, facilitating lateral movement and broad compromise. The use of stealthy techniques like DLL sideloading and rootkits increases the difficulty of detection and remediation. Given the geopolitical context, European entities involved in policy, government, energy, and critical infrastructure sectors are particularly vulnerable to espionage and influence operations. The presence of SEO cloaking backdoors also risks reputational damage and potential blacklisting of compromised web assets. The ongoing activity by multiple Chinese APT groups in Europe indicates a sustained threat environment requiring vigilant defense.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy focusing on: 1) Immediate patching and mitigation of all known legacy vulnerabilities exploited by these actors, including CVE-2022-26134, CVE-2021-44228, CVE-2017-9805, CVE-2017-17562, and CVE-2025-8088. 2) Conduct comprehensive audits of IIS server configurations to identify and remediate misconfigurations, especially exposure of ASP.NET machine keys. 3) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading, scheduled task abuse, and in-memory RAT execution. 4) Monitor for unusual scheduled tasks, especially those invoking msbuild.exe or csc.exe, and investigate any anomalous network connections to suspicious IPs or domains. 5) Harden domain controllers by restricting access, enabling multi-factor authentication, and monitoring for Dcsync and credential dumping activities. 6) Employ network segmentation to limit lateral movement and isolate critical assets. 7) Use threat intelligence feeds to detect indicators of compromise related to Chinese APT tooling and infrastructure. 8) Regularly review and update incident response plans to address advanced persistent threats and conduct red team exercises simulating these attack techniques. 9) Educate staff on phishing and social engineering tactics used by these groups to reduce initial infection vectors. 10) Collaborate with national cybersecurity centers and share threat intelligence to improve detection and response capabilities across Europe.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
Description
A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. entities that are linked to or involved in policy issues. The organization, according to a report from Broadcom's Symantec and Carbon Black teams, is "active in attempting to influence U.S. government
AI-Powered Analysis
Technical Analysis
This threat involves a China-linked advanced persistent threat (APT) actor leveraging a range of legacy vulnerabilities and misconfigurations to conduct cyber espionage and establish persistent footholds in targeted networks. The initial intrusion was detected in April 2025 against a U.S. non-profit organization engaged in policy influence, using mass scanning and exploitation of known CVEs such as CVE-2022-26134 (Atlassian), CVE-2021-44228 (Apache Log4j), CVE-2017-9805 (Apache Struts), and CVE-2017-17562 (GoAhead Web Server). Post-compromise actions included executing network reconnaissance commands (curl, netstat), creating scheduled tasks to run legitimate Microsoft binaries (msbuild.exe) for payload execution, and injecting code into csc.exe to communicate with a command-and-control server. The attackers deployed remote access trojans (RATs) in memory and used DLL sideloading techniques with legitimate antivirus components (Vipre’s vetysafe.exe) to evade detection. Tools such as Dcsync and Imjpuexc were observed, indicating attempts to harvest credentials and escalate privileges. The attackers targeted domain controllers to enable lateral movement and network-wide compromise. The campaign is linked to multiple Chinese APT groups, including Salt Typhoon (Earth Estries), Earth Longzhi, Space Pirates, and Kelp, who share tooling and techniques. Additional activity includes exploitation of WinRAR vulnerabilities (CVE-2025-8088) and IIS server compromises using publicly exposed ASP.NET machine keys to deploy the TOLLBOOTH backdoor with SEO cloaking and web shell capabilities. These IIS attacks enable unauthenticated remote command execution and use rootkits like HIDDENDRIVER to maintain stealth. Broader Chinese cyber campaigns also target sectors across Asia, Europe, Latin America, and the U.S., employing phishing, adversary-in-the-middle attacks, and DNS hijacking to deliver malware such as BLOODALCHEMY, WinDealer, and SlowStepper. The shared use of tools and overlapping tactics among Chinese groups complicates attribution and defense efforts.
Potential Impact
European organizations face significant risks from this threat due to the widespread use of affected legacy software and IIS servers across the continent. Successful exploitation can lead to unauthorized access, credential theft, and establishment of persistent backdoors, enabling espionage, data exfiltration, and potential disruption of critical services. Targeting domain controllers threatens the integrity and availability of entire networks, facilitating lateral movement and broad compromise. The use of stealthy techniques like DLL sideloading and rootkits increases the difficulty of detection and remediation. Given the geopolitical context, European entities involved in policy, government, energy, and critical infrastructure sectors are particularly vulnerable to espionage and influence operations. The presence of SEO cloaking backdoors also risks reputational damage and potential blacklisting of compromised web assets. The ongoing activity by multiple Chinese APT groups in Europe indicates a sustained threat environment requiring vigilant defense.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy focusing on: 1) Immediate patching and mitigation of all known legacy vulnerabilities exploited by these actors, including CVE-2022-26134, CVE-2021-44228, CVE-2017-9805, CVE-2017-17562, and CVE-2025-8088. 2) Conduct comprehensive audits of IIS server configurations to identify and remediate misconfigurations, especially exposure of ASP.NET machine keys. 3) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading, scheduled task abuse, and in-memory RAT execution. 4) Monitor for unusual scheduled tasks, especially those invoking msbuild.exe or csc.exe, and investigate any anomalous network connections to suspicious IPs or domains. 5) Harden domain controllers by restricting access, enabling multi-factor authentication, and monitoring for Dcsync and credential dumping activities. 6) Employ network segmentation to limit lateral movement and isolate critical assets. 7) Use threat intelligence feeds to detect indicators of compromise related to Chinese APT tooling and infrastructure. 8) Regularly review and update incident response plans to address advanced persistent threats and conduct red team exercises simulating these attack techniques. 9) Educate staff on phishing and social engineering tactics used by these groups to reduce initial infection vectors. 10) Collaborate with national cybersecurity centers and share threat intelligence to improve detection and response capabilities across Europe.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/11/from-log4j-to-iis-chinas-hackers-turn.html","fetched":true,"fetchedAt":"2025-11-08T02:51:38.584Z","wordCount":1664}
Threat ID: 690eb03c3a8fd010ecf20023
Added to database: 11/8/2025, 2:51:40 AM
Last enriched: 11/8/2025, 2:52:09 AM
Last updated: 11/21/2025, 8:02:58 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36149: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in IBM IBM Concert Software
MediumCVE-2023-22745: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in tpm2-software tpm2-tss
MediumCVE-2025-62608: CWE-122: Heap-based Buffer Overflow in ml-explore mlx
MediumCVE-2025-62609: CWE-476: NULL Pointer Dereference in ml-explore mlx
MediumCVE-2025-48502: CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input in AMD AMD μProf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.