Jewelbug: Chinese APT Group Widens Reach to Russia
Jewelbug is a Chinese advanced persistent threat (APT) group that has recently expanded its targeting to include Russian organizations, marking a notable shift in geopolitical cyber operations. The group conducted a prolonged intrusion into a Russian IT service provider for five months in 2025, likely aiming to facilitate a supply chain attack. Jewelbug employs sophisticated techniques such as DLL sideloading, bring-your-own-vulnerable-driver (BYOVD), and the use of legitimate tools to evade detection. A new backdoor leveraging Microsoft Graph API and OneDrive for command and control has been identified, demonstrating the group's capability to abuse cloud services for stealthy operations. The group's tactics cover a wide range of MITRE ATT&CK techniques including credential access, persistence, defense evasion, and lateral movement. Although no known exploits are currently in the wild, the threat poses a medium severity risk due to its potential impact and stealth. European organizations should be vigilant, especially those with supply chain dependencies or cloud service integrations similar to the targeted Russian IT provider. Mitigation requires advanced detection capabilities focusing on anomalous use of legitimate tools, monitoring for DLL sideloading, and restricting vulnerable driver usage. Countries with strong IT service sectors and geopolitical interest in China-Russia relations, such as Germany, France, and the UK, are likely to be more affected.
AI Analysis
Technical Summary
Jewelbug is a Chinese APT group that has broadened its operational scope beyond its traditional targets to include Russia, South America, South Asia, and Taiwan. The group's recent activity in Russia involved a five-month-long intrusion into an IT service provider, indicating a strategic intent to conduct supply chain attacks. Jewelbug's toolset includes new backdoors that exploit Microsoft Graph API and OneDrive for command and control, allowing them to blend malicious traffic with legitimate cloud service communications. Their tactics leverage legitimate administrative tools and advanced techniques such as DLL sideloading and bring-your-own-vulnerable-driver (BYOVD), which enable them to bypass traditional security controls and maintain persistence. The group uses a wide array of MITRE ATT&CK techniques, including credential dumping (T1003), process injection (T1055), scheduled task abuse (T1053), and defense evasion methods like timestomping and disabling security tools. The use of BYOVD is particularly notable as it allows Jewelbug to load vulnerable drivers to escalate privileges or evade detection without triggering typical security alerts. Despite the absence of publicly known exploits, the sophistication and stealth of Jewelbug's operations pose a significant threat to organizations relying on complex supply chains and cloud services. The shift to targeting Russia, previously considered an ally, suggests evolving geopolitical cyber dynamics. The group’s ability to operate undetected for months highlights the need for enhanced monitoring and threat hunting capabilities.
Potential Impact
For European organizations, the Jewelbug threat could have serious implications, especially for those involved in IT services, cloud infrastructure, and supply chain management. The group's use of supply chain attack vectors means that even organizations not directly targeted could be compromised through trusted third-party providers. The exploitation of Microsoft Graph API and OneDrive for command and control could impact organizations heavily reliant on Microsoft 365 and cloud services, common across Europe. Credential theft and privilege escalation techniques threaten the confidentiality and integrity of sensitive data, while persistence and lateral movement capabilities could lead to widespread network compromise. The stealthy nature of the attack, combined with the use of legitimate tools and vulnerable drivers, complicates detection and response efforts. This could result in prolonged undetected intrusions, data exfiltration, intellectual property theft, and potential disruption of critical services. The geopolitical shift in targeting Russia may also signal increased cyber tensions that could spill over into European countries with close ties to either China or Russia, increasing the risk of collateral or targeted attacks.
Mitigation Recommendations
European organizations should implement targeted detection and prevention strategies beyond generic advice. First, enhance monitoring for anomalous use of Microsoft Graph API and OneDrive, focusing on unusual patterns of data access or command and control traffic. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and BYOVD techniques, including monitoring for the loading of unsigned or vulnerable drivers. Conduct regular audits of installed drivers and remove or update any known vulnerable ones. Implement strict application whitelisting and code integrity policies to prevent unauthorized DLL loading. Strengthen credential protection by enforcing multi-factor authentication (MFA), monitoring for credential dumping activities, and limiting privileged account usage. Employ threat hunting exercises focused on the MITRE ATT&CK techniques associated with Jewelbug, such as scheduled task abuse and process injection. Maintain rigorous supply chain risk management, including vetting and continuous monitoring of third-party IT service providers. Finally, ensure timely patching of all systems and maintain robust network segmentation to limit lateral movement opportunities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Poland, Sweden
Indicators of Compromise
- hash: 3fd5aae11b1b05480a5d76119dc6ab2b
- hash: ba9d2d08c4275125f69b718f2c52119a
- hash: c01d4df11410bc3807945b9db5851d8b
- hash: e16f285cd6adfd4ba42a3a52e54894ac
- hash: eca2c3daa47e51e2ebc715d856811188
- hash: 11b71154984a293d469801444f9eb0e78d6b7f02
- hash: 22c31000f6fe7b2377fe685005f5d6092a569f28
- hash: 395bb42b27743578454f26e0e614b09534e8f0ea
- hash: 40205ea006597d5181cf927852a1e89051235dd5
- hash: 465f35c8a865b5904474bef9be163e680549f360
- hash: 010f76b21251eb5d8bc77bcfdb47d5f13009aa985e744b843fc2e35b23fb2a44
- hash: 015e424dc798bc4ef39f5237062d2402f5207fbf912a22ce6fb46ef9e42fd6ca
- hash: 0642ada1f7c8b3cc43a1d69d6aa86fc1970e257271811e637b0e4349aa880fa8
- hash: 078a3a2c4f24d8811bb1aa673790c16ad5ea563127af1a5d4a41c893b215c372
- hash: 15eaa601b1bfb8cd7cd5513c692eea4ed4302f6fcbee4722433e0c85388de35d
- hash: 259f65bcdd367e6d84a4cba75375744e85fbe58293c88b1ad5a1bee4add63b9d
- hash: 267ae4d7767d9980b3fbbfd5063bd28d5e05d22d64615fe7532d55a6063dfeb3
- hash: 37e83ffde09a83273a4cea7fe24d3fda63fb342e6a3512de4541d62ab43aadd0
- hash: 3f49bd1f3b0999096511757e0fbc2e4e2c18176fd1773f71baf2d7a15dbbcfbf
- hash: 5525c51063d40e12029d9ef4b646e261c853c655b9b2acc74a411428e873a8a1
- hash: 5c396da8b64faf6e29ee38cdf0a4b9a652e01236d2b981c2ca806aa14d94c956
- hash: 5c3f0420c00e6ca123790403b6ed1f53f493357dfdd54ed9460d615d57f6bcd4
- hash: 67bb887a0f34543a32b845029be308f436704207a1964a2a3582f42fe6de4176
- hash: 6d4d9b68d02e93e721943a6943cda6544bf4d31d109415774565b544b512ed25
- hash: 872045fe5bea78e4daac4f0352028060b0fadccfbf0a40b57d405579821850bb
- hash: 87ead55ff94b6cd9d80f590793d0dc17d9f5d442b6c827dcfb8db0c078918bd1
- hash: 9f4b046e9f9dbc36b8df011a69490948dce5b9645fc5209b0b3a60dad5a493e6
- hash: a1e45ec8639f55290a5eb47e9f75e6413b12eaa6f9e3834af600e00fe529a637
- hash: b49e142b89c47757a0afb786bf0e6c11c9548f626c4127d4d16d30e3004bdfb1
- hash: ba0dbee9538073fd81953a37218f200988ad91a8380e68118ea83e146e1d986d
- hash: bc270539c6a057791fba4793dc7e2d2567070e50ea089cc6fa032b3285576c64
- hash: bfe1538445e3f74ef7f41699482b40cf6f3b0a084e188f4c4b786b15eeb3601c
- hash: cc87dee890641bd015a04e46a881eb844c774519d55b986fb216c4c2141479e8
- hash: cffca467b6ff4dee8391c68650a53f4f3828a0b5a31a9aa501d2272b683205f9
- hash: d5147787d52636a3c6c2a0c84b351633ad7f45ce4ae5c2007e568f715fec3e49
- ip: 95.164.5.209
- domain: cdn.kindylib.info
Jewelbug: Chinese APT Group Widens Reach to Russia
Description
Jewelbug is a Chinese advanced persistent threat (APT) group that has recently expanded its targeting to include Russian organizations, marking a notable shift in geopolitical cyber operations. The group conducted a prolonged intrusion into a Russian IT service provider for five months in 2025, likely aiming to facilitate a supply chain attack. Jewelbug employs sophisticated techniques such as DLL sideloading, bring-your-own-vulnerable-driver (BYOVD), and the use of legitimate tools to evade detection. A new backdoor leveraging Microsoft Graph API and OneDrive for command and control has been identified, demonstrating the group's capability to abuse cloud services for stealthy operations. The group's tactics cover a wide range of MITRE ATT&CK techniques including credential access, persistence, defense evasion, and lateral movement. Although no known exploits are currently in the wild, the threat poses a medium severity risk due to its potential impact and stealth. European organizations should be vigilant, especially those with supply chain dependencies or cloud service integrations similar to the targeted Russian IT provider. Mitigation requires advanced detection capabilities focusing on anomalous use of legitimate tools, monitoring for DLL sideloading, and restricting vulnerable driver usage. Countries with strong IT service sectors and geopolitical interest in China-Russia relations, such as Germany, France, and the UK, are likely to be more affected.
AI-Powered Analysis
Technical Analysis
Jewelbug is a Chinese APT group that has broadened its operational scope beyond its traditional targets to include Russia, South America, South Asia, and Taiwan. The group's recent activity in Russia involved a five-month-long intrusion into an IT service provider, indicating a strategic intent to conduct supply chain attacks. Jewelbug's toolset includes new backdoors that exploit Microsoft Graph API and OneDrive for command and control, allowing them to blend malicious traffic with legitimate cloud service communications. Their tactics leverage legitimate administrative tools and advanced techniques such as DLL sideloading and bring-your-own-vulnerable-driver (BYOVD), which enable them to bypass traditional security controls and maintain persistence. The group uses a wide array of MITRE ATT&CK techniques, including credential dumping (T1003), process injection (T1055), scheduled task abuse (T1053), and defense evasion methods like timestomping and disabling security tools. The use of BYOVD is particularly notable as it allows Jewelbug to load vulnerable drivers to escalate privileges or evade detection without triggering typical security alerts. Despite the absence of publicly known exploits, the sophistication and stealth of Jewelbug's operations pose a significant threat to organizations relying on complex supply chains and cloud services. The shift to targeting Russia, previously considered an ally, suggests evolving geopolitical cyber dynamics. The group’s ability to operate undetected for months highlights the need for enhanced monitoring and threat hunting capabilities.
Potential Impact
For European organizations, the Jewelbug threat could have serious implications, especially for those involved in IT services, cloud infrastructure, and supply chain management. The group's use of supply chain attack vectors means that even organizations not directly targeted could be compromised through trusted third-party providers. The exploitation of Microsoft Graph API and OneDrive for command and control could impact organizations heavily reliant on Microsoft 365 and cloud services, common across Europe. Credential theft and privilege escalation techniques threaten the confidentiality and integrity of sensitive data, while persistence and lateral movement capabilities could lead to widespread network compromise. The stealthy nature of the attack, combined with the use of legitimate tools and vulnerable drivers, complicates detection and response efforts. This could result in prolonged undetected intrusions, data exfiltration, intellectual property theft, and potential disruption of critical services. The geopolitical shift in targeting Russia may also signal increased cyber tensions that could spill over into European countries with close ties to either China or Russia, increasing the risk of collateral or targeted attacks.
Mitigation Recommendations
European organizations should implement targeted detection and prevention strategies beyond generic advice. First, enhance monitoring for anomalous use of Microsoft Graph API and OneDrive, focusing on unusual patterns of data access or command and control traffic. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and BYOVD techniques, including monitoring for the loading of unsigned or vulnerable drivers. Conduct regular audits of installed drivers and remove or update any known vulnerable ones. Implement strict application whitelisting and code integrity policies to prevent unauthorized DLL loading. Strengthen credential protection by enforcing multi-factor authentication (MFA), monitoring for credential dumping activities, and limiting privileged account usage. Employ threat hunting exercises focused on the MITRE ATT&CK techniques associated with Jewelbug, such as scheduled task abuse and process injection. Maintain rigorous supply chain risk management, including vetting and continuous monitoring of third-party IT service providers. Finally, ensure timely patching of all systems and maintain robust network segmentation to limit lateral movement opportunities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.security.com/threat-intelligence/jewelbug-apt-russia"]
- Adversary
- Jewelbug
- Pulse Id
- 68fb43f09453e7a12ad2dab2
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash3fd5aae11b1b05480a5d76119dc6ab2b | — | |
hashba9d2d08c4275125f69b718f2c52119a | — | |
hashc01d4df11410bc3807945b9db5851d8b | — | |
hashe16f285cd6adfd4ba42a3a52e54894ac | — | |
hasheca2c3daa47e51e2ebc715d856811188 | — | |
hash11b71154984a293d469801444f9eb0e78d6b7f02 | — | |
hash22c31000f6fe7b2377fe685005f5d6092a569f28 | — | |
hash395bb42b27743578454f26e0e614b09534e8f0ea | — | |
hash40205ea006597d5181cf927852a1e89051235dd5 | — | |
hash465f35c8a865b5904474bef9be163e680549f360 | — | |
hash010f76b21251eb5d8bc77bcfdb47d5f13009aa985e744b843fc2e35b23fb2a44 | — | |
hash015e424dc798bc4ef39f5237062d2402f5207fbf912a22ce6fb46ef9e42fd6ca | — | |
hash0642ada1f7c8b3cc43a1d69d6aa86fc1970e257271811e637b0e4349aa880fa8 | — | |
hash078a3a2c4f24d8811bb1aa673790c16ad5ea563127af1a5d4a41c893b215c372 | — | |
hash15eaa601b1bfb8cd7cd5513c692eea4ed4302f6fcbee4722433e0c85388de35d | — | |
hash259f65bcdd367e6d84a4cba75375744e85fbe58293c88b1ad5a1bee4add63b9d | — | |
hash267ae4d7767d9980b3fbbfd5063bd28d5e05d22d64615fe7532d55a6063dfeb3 | — | |
hash37e83ffde09a83273a4cea7fe24d3fda63fb342e6a3512de4541d62ab43aadd0 | — | |
hash3f49bd1f3b0999096511757e0fbc2e4e2c18176fd1773f71baf2d7a15dbbcfbf | — | |
hash5525c51063d40e12029d9ef4b646e261c853c655b9b2acc74a411428e873a8a1 | — | |
hash5c396da8b64faf6e29ee38cdf0a4b9a652e01236d2b981c2ca806aa14d94c956 | — | |
hash5c3f0420c00e6ca123790403b6ed1f53f493357dfdd54ed9460d615d57f6bcd4 | — | |
hash67bb887a0f34543a32b845029be308f436704207a1964a2a3582f42fe6de4176 | — | |
hash6d4d9b68d02e93e721943a6943cda6544bf4d31d109415774565b544b512ed25 | — | |
hash872045fe5bea78e4daac4f0352028060b0fadccfbf0a40b57d405579821850bb | — | |
hash87ead55ff94b6cd9d80f590793d0dc17d9f5d442b6c827dcfb8db0c078918bd1 | — | |
hash9f4b046e9f9dbc36b8df011a69490948dce5b9645fc5209b0b3a60dad5a493e6 | — | |
hasha1e45ec8639f55290a5eb47e9f75e6413b12eaa6f9e3834af600e00fe529a637 | — | |
hashb49e142b89c47757a0afb786bf0e6c11c9548f626c4127d4d16d30e3004bdfb1 | — | |
hashba0dbee9538073fd81953a37218f200988ad91a8380e68118ea83e146e1d986d | — | |
hashbc270539c6a057791fba4793dc7e2d2567070e50ea089cc6fa032b3285576c64 | — | |
hashbfe1538445e3f74ef7f41699482b40cf6f3b0a084e188f4c4b786b15eeb3601c | — | |
hashcc87dee890641bd015a04e46a881eb844c774519d55b986fb216c4c2141479e8 | — | |
hashcffca467b6ff4dee8391c68650a53f4f3828a0b5a31a9aa501d2272b683205f9 | — | |
hashd5147787d52636a3c6c2a0c84b351633ad7f45ce4ae5c2007e568f715fec3e49 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip95.164.5.209 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincdn.kindylib.info | — |
Threat ID: 68fb4682df38e44162dd7192
Added to database: 10/24/2025, 9:27:30 AM
Last enriched: 10/24/2025, 9:35:37 AM
Last updated: 10/25/2025, 12:48:14 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-10-24
MediumDissecting YouTube's Malware Distribution Network
MediumThe Smishing Deluge: China-Based Campaign Flooding Global Text Messages
MediumNewly Spotted Baohuo Android Backdoor Is Hijacking Telegram Accounts Through Fake Telegram X App
MediumGotta fly: Lazarus targets the UAV sector
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.