Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Jewelbug: Chinese APT Group Widens Reach to Russia

0
Medium
Published: Fri Oct 24 2025 (10/24/2025, 09:16:32 UTC)
Source: AlienVault OTX General

Description

Jewelbug is a Chinese advanced persistent threat (APT) group that has recently expanded its targeting to include Russian organizations, marking a notable shift in geopolitical cyber operations. The group conducted a prolonged intrusion into a Russian IT service provider for five months in 2025, likely aiming to facilitate a supply chain attack. Jewelbug employs sophisticated techniques such as DLL sideloading, bring-your-own-vulnerable-driver (BYOVD), and the use of legitimate tools to evade detection. A new backdoor leveraging Microsoft Graph API and OneDrive for command and control has been identified, demonstrating the group's capability to abuse cloud services for stealthy operations. The group's tactics cover a wide range of MITRE ATT&CK techniques including credential access, persistence, defense evasion, and lateral movement. Although no known exploits are currently in the wild, the threat poses a medium severity risk due to its potential impact and stealth. European organizations should be vigilant, especially those with supply chain dependencies or cloud service integrations similar to the targeted Russian IT provider. Mitigation requires advanced detection capabilities focusing on anomalous use of legitimate tools, monitoring for DLL sideloading, and restricting vulnerable driver usage. Countries with strong IT service sectors and geopolitical interest in China-Russia relations, such as Germany, France, and the UK, are likely to be more affected.

AI-Powered Analysis

AILast updated: 10/24/2025, 09:35:37 UTC

Technical Analysis

Jewelbug is a Chinese APT group that has broadened its operational scope beyond its traditional targets to include Russia, South America, South Asia, and Taiwan. The group's recent activity in Russia involved a five-month-long intrusion into an IT service provider, indicating a strategic intent to conduct supply chain attacks. Jewelbug's toolset includes new backdoors that exploit Microsoft Graph API and OneDrive for command and control, allowing them to blend malicious traffic with legitimate cloud service communications. Their tactics leverage legitimate administrative tools and advanced techniques such as DLL sideloading and bring-your-own-vulnerable-driver (BYOVD), which enable them to bypass traditional security controls and maintain persistence. The group uses a wide array of MITRE ATT&CK techniques, including credential dumping (T1003), process injection (T1055), scheduled task abuse (T1053), and defense evasion methods like timestomping and disabling security tools. The use of BYOVD is particularly notable as it allows Jewelbug to load vulnerable drivers to escalate privileges or evade detection without triggering typical security alerts. Despite the absence of publicly known exploits, the sophistication and stealth of Jewelbug's operations pose a significant threat to organizations relying on complex supply chains and cloud services. The shift to targeting Russia, previously considered an ally, suggests evolving geopolitical cyber dynamics. The group’s ability to operate undetected for months highlights the need for enhanced monitoring and threat hunting capabilities.

Potential Impact

For European organizations, the Jewelbug threat could have serious implications, especially for those involved in IT services, cloud infrastructure, and supply chain management. The group's use of supply chain attack vectors means that even organizations not directly targeted could be compromised through trusted third-party providers. The exploitation of Microsoft Graph API and OneDrive for command and control could impact organizations heavily reliant on Microsoft 365 and cloud services, common across Europe. Credential theft and privilege escalation techniques threaten the confidentiality and integrity of sensitive data, while persistence and lateral movement capabilities could lead to widespread network compromise. The stealthy nature of the attack, combined with the use of legitimate tools and vulnerable drivers, complicates detection and response efforts. This could result in prolonged undetected intrusions, data exfiltration, intellectual property theft, and potential disruption of critical services. The geopolitical shift in targeting Russia may also signal increased cyber tensions that could spill over into European countries with close ties to either China or Russia, increasing the risk of collateral or targeted attacks.

Mitigation Recommendations

European organizations should implement targeted detection and prevention strategies beyond generic advice. First, enhance monitoring for anomalous use of Microsoft Graph API and OneDrive, focusing on unusual patterns of data access or command and control traffic. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and BYOVD techniques, including monitoring for the loading of unsigned or vulnerable drivers. Conduct regular audits of installed drivers and remove or update any known vulnerable ones. Implement strict application whitelisting and code integrity policies to prevent unauthorized DLL loading. Strengthen credential protection by enforcing multi-factor authentication (MFA), monitoring for credential dumping activities, and limiting privileged account usage. Employ threat hunting exercises focused on the MITRE ATT&CK techniques associated with Jewelbug, such as scheduled task abuse and process injection. Maintain rigorous supply chain risk management, including vetting and continuous monitoring of third-party IT service providers. Finally, ensure timely patching of all systems and maintain robust network segmentation to limit lateral movement opportunities.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.security.com/threat-intelligence/jewelbug-apt-russia"]
Adversary
Jewelbug
Pulse Id
68fb43f09453e7a12ad2dab2
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash3fd5aae11b1b05480a5d76119dc6ab2b
hashba9d2d08c4275125f69b718f2c52119a
hashc01d4df11410bc3807945b9db5851d8b
hashe16f285cd6adfd4ba42a3a52e54894ac
hasheca2c3daa47e51e2ebc715d856811188
hash11b71154984a293d469801444f9eb0e78d6b7f02
hash22c31000f6fe7b2377fe685005f5d6092a569f28
hash395bb42b27743578454f26e0e614b09534e8f0ea
hash40205ea006597d5181cf927852a1e89051235dd5
hash465f35c8a865b5904474bef9be163e680549f360
hash010f76b21251eb5d8bc77bcfdb47d5f13009aa985e744b843fc2e35b23fb2a44
hash015e424dc798bc4ef39f5237062d2402f5207fbf912a22ce6fb46ef9e42fd6ca
hash0642ada1f7c8b3cc43a1d69d6aa86fc1970e257271811e637b0e4349aa880fa8
hash078a3a2c4f24d8811bb1aa673790c16ad5ea563127af1a5d4a41c893b215c372
hash15eaa601b1bfb8cd7cd5513c692eea4ed4302f6fcbee4722433e0c85388de35d
hash259f65bcdd367e6d84a4cba75375744e85fbe58293c88b1ad5a1bee4add63b9d
hash267ae4d7767d9980b3fbbfd5063bd28d5e05d22d64615fe7532d55a6063dfeb3
hash37e83ffde09a83273a4cea7fe24d3fda63fb342e6a3512de4541d62ab43aadd0
hash3f49bd1f3b0999096511757e0fbc2e4e2c18176fd1773f71baf2d7a15dbbcfbf
hash5525c51063d40e12029d9ef4b646e261c853c655b9b2acc74a411428e873a8a1
hash5c396da8b64faf6e29ee38cdf0a4b9a652e01236d2b981c2ca806aa14d94c956
hash5c3f0420c00e6ca123790403b6ed1f53f493357dfdd54ed9460d615d57f6bcd4
hash67bb887a0f34543a32b845029be308f436704207a1964a2a3582f42fe6de4176
hash6d4d9b68d02e93e721943a6943cda6544bf4d31d109415774565b544b512ed25
hash872045fe5bea78e4daac4f0352028060b0fadccfbf0a40b57d405579821850bb
hash87ead55ff94b6cd9d80f590793d0dc17d9f5d442b6c827dcfb8db0c078918bd1
hash9f4b046e9f9dbc36b8df011a69490948dce5b9645fc5209b0b3a60dad5a493e6
hasha1e45ec8639f55290a5eb47e9f75e6413b12eaa6f9e3834af600e00fe529a637
hashb49e142b89c47757a0afb786bf0e6c11c9548f626c4127d4d16d30e3004bdfb1
hashba0dbee9538073fd81953a37218f200988ad91a8380e68118ea83e146e1d986d
hashbc270539c6a057791fba4793dc7e2d2567070e50ea089cc6fa032b3285576c64
hashbfe1538445e3f74ef7f41699482b40cf6f3b0a084e188f4c4b786b15eeb3601c
hashcc87dee890641bd015a04e46a881eb844c774519d55b986fb216c4c2141479e8
hashcffca467b6ff4dee8391c68650a53f4f3828a0b5a31a9aa501d2272b683205f9
hashd5147787d52636a3c6c2a0c84b351633ad7f45ce4ae5c2007e568f715fec3e49

Ip

ValueDescriptionCopy
ip95.164.5.209

Domain

ValueDescriptionCopy
domaincdn.kindylib.info

Threat ID: 68fb4682df38e44162dd7192

Added to database: 10/24/2025, 9:27:30 AM

Last enriched: 10/24/2025, 9:35:37 AM

Last updated: 10/25/2025, 12:48:14 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats