Jewelbug: Chinese APT Group Widens Reach to Russia
A Chinese APT group named Jewelbug has expanded its operations to target organizations in South America, South Asia, Taiwan, and Russia. The group's recent intrusion into a Russian IT service provider lasted for five months in 2025, potentially aiming for a supply chain attack. Jewelbug has deployed new backdoors, including one leveraging Microsoft Graph API and OneDrive for command and control. The group's tactics include using legitimate tools, DLL sideloading, and the bring-your-own-vulnerable-driver technique. Notably, Jewelbug's targeting of Russian organizations marks a shift in Chinese cyber operations, previously considered to be allied with Russia.
AI Analysis
Technical Summary
Jewelbug is a Chinese APT group that has broadened its operational scope beyond its traditional targets to include Russia, South America, South Asia, and Taiwan. The group's recent activity in Russia involved a five-month-long intrusion into an IT service provider, indicating a strategic intent to conduct supply chain attacks. Jewelbug's toolset includes new backdoors that exploit Microsoft Graph API and OneDrive for command and control, allowing them to blend malicious traffic with legitimate cloud service communications. Their tactics leverage legitimate administrative tools and advanced techniques such as DLL sideloading and bring-your-own-vulnerable-driver (BYOVD), which enable them to bypass traditional security controls and maintain persistence. The group uses a wide array of MITRE ATT&CK techniques, including credential dumping (T1003), process injection (T1055), scheduled task abuse (T1053), and defense evasion methods like timestomping and disabling security tools. The use of BYOVD is particularly notable as it allows Jewelbug to load vulnerable drivers to escalate privileges or evade detection without triggering typical security alerts. Despite the absence of publicly known exploits, the sophistication and stealth of Jewelbug's operations pose a significant threat to organizations relying on complex supply chains and cloud services. The shift to targeting Russia, previously considered an ally, suggests evolving geopolitical cyber dynamics. The group’s ability to operate undetected for months highlights the need for enhanced monitoring and threat hunting capabilities.
Potential Impact
For European organizations, the Jewelbug threat could have serious implications, especially for those involved in IT services, cloud infrastructure, and supply chain management. The group's use of supply chain attack vectors means that even organizations not directly targeted could be compromised through trusted third-party providers. The exploitation of Microsoft Graph API and OneDrive for command and control could impact organizations heavily reliant on Microsoft 365 and cloud services, common across Europe. Credential theft and privilege escalation techniques threaten the confidentiality and integrity of sensitive data, while persistence and lateral movement capabilities could lead to widespread network compromise. The stealthy nature of the attack, combined with the use of legitimate tools and vulnerable drivers, complicates detection and response efforts. This could result in prolonged undetected intrusions, data exfiltration, intellectual property theft, and potential disruption of critical services. The geopolitical shift in targeting Russia may also signal increased cyber tensions that could spill over into European countries with close ties to either China or Russia, increasing the risk of collateral or targeted attacks.
Mitigation Recommendations
European organizations should implement targeted detection and prevention strategies beyond generic advice. First, enhance monitoring for anomalous use of Microsoft Graph API and OneDrive, focusing on unusual patterns of data access or command and control traffic. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and BYOVD techniques, including monitoring for the loading of unsigned or vulnerable drivers. Conduct regular audits of installed drivers and remove or update any known vulnerable ones. Implement strict application whitelisting and code integrity policies to prevent unauthorized DLL loading. Strengthen credential protection by enforcing multi-factor authentication (MFA), monitoring for credential dumping activities, and limiting privileged account usage. Employ threat hunting exercises focused on the MITRE ATT&CK techniques associated with Jewelbug, such as scheduled task abuse and process injection. Maintain rigorous supply chain risk management, including vetting and continuous monitoring of third-party IT service providers. Finally, ensure timely patching of all systems and maintain robust network segmentation to limit lateral movement opportunities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Poland, Sweden
Indicators of Compromise
- hash: 3fd5aae11b1b05480a5d76119dc6ab2b
- hash: ba9d2d08c4275125f69b718f2c52119a
- hash: c01d4df11410bc3807945b9db5851d8b
- hash: e16f285cd6adfd4ba42a3a52e54894ac
- hash: eca2c3daa47e51e2ebc715d856811188
- hash: 11b71154984a293d469801444f9eb0e78d6b7f02
- hash: 22c31000f6fe7b2377fe685005f5d6092a569f28
- hash: 395bb42b27743578454f26e0e614b09534e8f0ea
- hash: 40205ea006597d5181cf927852a1e89051235dd5
- hash: 465f35c8a865b5904474bef9be163e680549f360
- hash: 010f76b21251eb5d8bc77bcfdb47d5f13009aa985e744b843fc2e35b23fb2a44
- hash: 015e424dc798bc4ef39f5237062d2402f5207fbf912a22ce6fb46ef9e42fd6ca
- hash: 0642ada1f7c8b3cc43a1d69d6aa86fc1970e257271811e637b0e4349aa880fa8
- hash: 078a3a2c4f24d8811bb1aa673790c16ad5ea563127af1a5d4a41c893b215c372
- hash: 15eaa601b1bfb8cd7cd5513c692eea4ed4302f6fcbee4722433e0c85388de35d
- hash: 259f65bcdd367e6d84a4cba75375744e85fbe58293c88b1ad5a1bee4add63b9d
- hash: 267ae4d7767d9980b3fbbfd5063bd28d5e05d22d64615fe7532d55a6063dfeb3
- hash: 37e83ffde09a83273a4cea7fe24d3fda63fb342e6a3512de4541d62ab43aadd0
- hash: 3f49bd1f3b0999096511757e0fbc2e4e2c18176fd1773f71baf2d7a15dbbcfbf
- hash: 5525c51063d40e12029d9ef4b646e261c853c655b9b2acc74a411428e873a8a1
- hash: 5c396da8b64faf6e29ee38cdf0a4b9a652e01236d2b981c2ca806aa14d94c956
- hash: 5c3f0420c00e6ca123790403b6ed1f53f493357dfdd54ed9460d615d57f6bcd4
- hash: 67bb887a0f34543a32b845029be308f436704207a1964a2a3582f42fe6de4176
- hash: 6d4d9b68d02e93e721943a6943cda6544bf4d31d109415774565b544b512ed25
- hash: 872045fe5bea78e4daac4f0352028060b0fadccfbf0a40b57d405579821850bb
- hash: 87ead55ff94b6cd9d80f590793d0dc17d9f5d442b6c827dcfb8db0c078918bd1
- hash: 9f4b046e9f9dbc36b8df011a69490948dce5b9645fc5209b0b3a60dad5a493e6
- hash: a1e45ec8639f55290a5eb47e9f75e6413b12eaa6f9e3834af600e00fe529a637
- hash: b49e142b89c47757a0afb786bf0e6c11c9548f626c4127d4d16d30e3004bdfb1
- hash: ba0dbee9538073fd81953a37218f200988ad91a8380e68118ea83e146e1d986d
- hash: bc270539c6a057791fba4793dc7e2d2567070e50ea089cc6fa032b3285576c64
- hash: bfe1538445e3f74ef7f41699482b40cf6f3b0a084e188f4c4b786b15eeb3601c
- hash: cc87dee890641bd015a04e46a881eb844c774519d55b986fb216c4c2141479e8
- hash: cffca467b6ff4dee8391c68650a53f4f3828a0b5a31a9aa501d2272b683205f9
- hash: d5147787d52636a3c6c2a0c84b351633ad7f45ce4ae5c2007e568f715fec3e49
- ip: 95.164.5.209
- domain: cdn.kindylib.info
Jewelbug: Chinese APT Group Widens Reach to Russia
Description
A Chinese APT group named Jewelbug has expanded its operations to target organizations in South America, South Asia, Taiwan, and Russia. The group's recent intrusion into a Russian IT service provider lasted for five months in 2025, potentially aiming for a supply chain attack. Jewelbug has deployed new backdoors, including one leveraging Microsoft Graph API and OneDrive for command and control. The group's tactics include using legitimate tools, DLL sideloading, and the bring-your-own-vulnerable-driver technique. Notably, Jewelbug's targeting of Russian organizations marks a shift in Chinese cyber operations, previously considered to be allied with Russia.
AI-Powered Analysis
Technical Analysis
Jewelbug is a Chinese APT group that has broadened its operational scope beyond its traditional targets to include Russia, South America, South Asia, and Taiwan. The group's recent activity in Russia involved a five-month-long intrusion into an IT service provider, indicating a strategic intent to conduct supply chain attacks. Jewelbug's toolset includes new backdoors that exploit Microsoft Graph API and OneDrive for command and control, allowing them to blend malicious traffic with legitimate cloud service communications. Their tactics leverage legitimate administrative tools and advanced techniques such as DLL sideloading and bring-your-own-vulnerable-driver (BYOVD), which enable them to bypass traditional security controls and maintain persistence. The group uses a wide array of MITRE ATT&CK techniques, including credential dumping (T1003), process injection (T1055), scheduled task abuse (T1053), and defense evasion methods like timestomping and disabling security tools. The use of BYOVD is particularly notable as it allows Jewelbug to load vulnerable drivers to escalate privileges or evade detection without triggering typical security alerts. Despite the absence of publicly known exploits, the sophistication and stealth of Jewelbug's operations pose a significant threat to organizations relying on complex supply chains and cloud services. The shift to targeting Russia, previously considered an ally, suggests evolving geopolitical cyber dynamics. The group’s ability to operate undetected for months highlights the need for enhanced monitoring and threat hunting capabilities.
Potential Impact
For European organizations, the Jewelbug threat could have serious implications, especially for those involved in IT services, cloud infrastructure, and supply chain management. The group's use of supply chain attack vectors means that even organizations not directly targeted could be compromised through trusted third-party providers. The exploitation of Microsoft Graph API and OneDrive for command and control could impact organizations heavily reliant on Microsoft 365 and cloud services, common across Europe. Credential theft and privilege escalation techniques threaten the confidentiality and integrity of sensitive data, while persistence and lateral movement capabilities could lead to widespread network compromise. The stealthy nature of the attack, combined with the use of legitimate tools and vulnerable drivers, complicates detection and response efforts. This could result in prolonged undetected intrusions, data exfiltration, intellectual property theft, and potential disruption of critical services. The geopolitical shift in targeting Russia may also signal increased cyber tensions that could spill over into European countries with close ties to either China or Russia, increasing the risk of collateral or targeted attacks.
Mitigation Recommendations
European organizations should implement targeted detection and prevention strategies beyond generic advice. First, enhance monitoring for anomalous use of Microsoft Graph API and OneDrive, focusing on unusual patterns of data access or command and control traffic. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and BYOVD techniques, including monitoring for the loading of unsigned or vulnerable drivers. Conduct regular audits of installed drivers and remove or update any known vulnerable ones. Implement strict application whitelisting and code integrity policies to prevent unauthorized DLL loading. Strengthen credential protection by enforcing multi-factor authentication (MFA), monitoring for credential dumping activities, and limiting privileged account usage. Employ threat hunting exercises focused on the MITRE ATT&CK techniques associated with Jewelbug, such as scheduled task abuse and process injection. Maintain rigorous supply chain risk management, including vetting and continuous monitoring of third-party IT service providers. Finally, ensure timely patching of all systems and maintain robust network segmentation to limit lateral movement opportunities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.security.com/threat-intelligence/jewelbug-apt-russia"]
- Adversary
- Jewelbug
- Pulse Id
- 68fb43f09453e7a12ad2dab2
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash3fd5aae11b1b05480a5d76119dc6ab2b | — | |
hashba9d2d08c4275125f69b718f2c52119a | — | |
hashc01d4df11410bc3807945b9db5851d8b | — | |
hashe16f285cd6adfd4ba42a3a52e54894ac | — | |
hasheca2c3daa47e51e2ebc715d856811188 | — | |
hash11b71154984a293d469801444f9eb0e78d6b7f02 | — | |
hash22c31000f6fe7b2377fe685005f5d6092a569f28 | — | |
hash395bb42b27743578454f26e0e614b09534e8f0ea | — | |
hash40205ea006597d5181cf927852a1e89051235dd5 | — | |
hash465f35c8a865b5904474bef9be163e680549f360 | — | |
hash010f76b21251eb5d8bc77bcfdb47d5f13009aa985e744b843fc2e35b23fb2a44 | — | |
hash015e424dc798bc4ef39f5237062d2402f5207fbf912a22ce6fb46ef9e42fd6ca | — | |
hash0642ada1f7c8b3cc43a1d69d6aa86fc1970e257271811e637b0e4349aa880fa8 | — | |
hash078a3a2c4f24d8811bb1aa673790c16ad5ea563127af1a5d4a41c893b215c372 | — | |
hash15eaa601b1bfb8cd7cd5513c692eea4ed4302f6fcbee4722433e0c85388de35d | — | |
hash259f65bcdd367e6d84a4cba75375744e85fbe58293c88b1ad5a1bee4add63b9d | — | |
hash267ae4d7767d9980b3fbbfd5063bd28d5e05d22d64615fe7532d55a6063dfeb3 | — | |
hash37e83ffde09a83273a4cea7fe24d3fda63fb342e6a3512de4541d62ab43aadd0 | — | |
hash3f49bd1f3b0999096511757e0fbc2e4e2c18176fd1773f71baf2d7a15dbbcfbf | — | |
hash5525c51063d40e12029d9ef4b646e261c853c655b9b2acc74a411428e873a8a1 | — | |
hash5c396da8b64faf6e29ee38cdf0a4b9a652e01236d2b981c2ca806aa14d94c956 | — | |
hash5c3f0420c00e6ca123790403b6ed1f53f493357dfdd54ed9460d615d57f6bcd4 | — | |
hash67bb887a0f34543a32b845029be308f436704207a1964a2a3582f42fe6de4176 | — | |
hash6d4d9b68d02e93e721943a6943cda6544bf4d31d109415774565b544b512ed25 | — | |
hash872045fe5bea78e4daac4f0352028060b0fadccfbf0a40b57d405579821850bb | — | |
hash87ead55ff94b6cd9d80f590793d0dc17d9f5d442b6c827dcfb8db0c078918bd1 | — | |
hash9f4b046e9f9dbc36b8df011a69490948dce5b9645fc5209b0b3a60dad5a493e6 | — | |
hasha1e45ec8639f55290a5eb47e9f75e6413b12eaa6f9e3834af600e00fe529a637 | — | |
hashb49e142b89c47757a0afb786bf0e6c11c9548f626c4127d4d16d30e3004bdfb1 | — | |
hashba0dbee9538073fd81953a37218f200988ad91a8380e68118ea83e146e1d986d | — | |
hashbc270539c6a057791fba4793dc7e2d2567070e50ea089cc6fa032b3285576c64 | — | |
hashbfe1538445e3f74ef7f41699482b40cf6f3b0a084e188f4c4b786b15eeb3601c | — | |
hashcc87dee890641bd015a04e46a881eb844c774519d55b986fb216c4c2141479e8 | — | |
hashcffca467b6ff4dee8391c68650a53f4f3828a0b5a31a9aa501d2272b683205f9 | — | |
hashd5147787d52636a3c6c2a0c84b351633ad7f45ce4ae5c2007e568f715fec3e49 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip95.164.5.209 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincdn.kindylib.info | — |
Threat ID: 68fb4682df38e44162dd7192
Added to database: 10/24/2025, 9:27:30 AM
Last enriched: 10/24/2025, 9:35:37 AM
Last updated: 12/9/2025, 6:07:22 AM
Views: 319
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-08
MediumChrimeraWire Trojan Targets Windows, Fakes Chrome Activity to Manipulate Search Rankings
MediumExperts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
MediumMicrosoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild (Updated November 3)
Medium⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.