Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Operation DRAGONCLONE: Chinese Telecom Targeted by Malware

0
Medium
Published: Sat Jun 07 2025 (06/07/2025, 10:12:03 UTC)
Source: AlienVault OTX General

Description

Operation DRAGONCLONE is an advanced cyber espionage campaign targeting China Mobile Tietong and potentially European telecom organizations connected to Chinese infrastructure. It uses sophisticated malware loaders like VELETRIX and the VShell adversary simulation tool, delivered via malicious ZIP files exploiting DLL sideloading and anti-analysis techniques such as IPFuscation. The campaign is linked to China-nexus threat groups UNC5174 (Uteus) and Earth Lamia and employs tools including SuperShell, Cobalt Strike, and Asset Lighthouse System. Active since March 2025, it focuses on credential theft, network reconnaissance, and callback execution. Detection requires monitoring for specific malware behaviors, DLL sideloading, and network callbacks. Germany, France, and the UK are at heightened risk due to their telecom sectors and economic ties to China. The threat is assessed as high severity given its advanced evasion, espionage intent, and potential impact on critical telecom infrastructure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 09:45:48 UTC

Technical Analysis

Operation DRAGONCLONE represents a sophisticated cyber espionage campaign primarily targeting China Mobile Tietong, a subsidiary of China Mobile, and potentially extending to European telecom organizations with supply chain or infrastructure ties to Chinese telecom entities. The attack vector begins with a malicious ZIP archive containing executables and DLLs designed to exploit DLL sideloading vulnerabilities, allowing malicious code to run under the guise of legitimate applications. The campaign employs advanced anti-analysis techniques such as IPFuscation, which obfuscates IP addresses to evade network detection and analysis tools. The malware loaders VELETRIX and the VShell adversary simulation tool are central to the attack, facilitating payload delivery and execution. The threat actors behind this campaign are linked to China-nexus groups UNC5174 (also known as Uteus) and Earth Lamia, known for their targeted espionage operations. Additional tools used include SuperShell, Cobalt Strike (a well-known post-exploitation framework), and the Asset Lighthouse System, which likely aids in network reconnaissance and lateral movement. The campaign has been active since March 2025 and focuses on stealing credentials, conducting network reconnaissance to map and understand the target environment, and executing callbacks to command and control servers for further instructions. Detection is challenging due to the use of DLL sideloading and IPFuscation, requiring defenders to monitor for anomalous DLL loading behaviors, unusual network callback patterns, and the presence of VELETRIX and VShell-related activities. The campaign’s targeting of telecom infrastructure, a critical sector for national security and economic stability, combined with its advanced evasion techniques, underscores its high threat level. European countries with significant telecom infrastructure and economic connections to China, such as Germany, France, and the UK, are considered at elevated risk.

Potential Impact

The potential impact of Operation DRAGONCLONE is significant for organizations involved in telecom infrastructure, particularly those linked to China Mobile Tietong or with supply chain connections to Chinese telecom entities. Successful exploitation can lead to credential theft, enabling attackers to gain persistent access and escalate privileges within networks. Network reconnaissance activities can expose sensitive internal architecture and operational details, facilitating further attacks or espionage. The use of callback execution allows attackers to maintain command and control, potentially leading to data exfiltration, disruption of services, or deployment of additional malware. For telecom providers, this could mean compromised customer data, degraded network integrity, and loss of trust. European telecom organizations with economic ties to China may face secondary risks, including supply chain compromises and espionage targeting intellectual property or strategic communications. The campaign’s advanced evasion techniques complicate detection and response, increasing the likelihood of prolonged undetected presence and greater damage. National security implications are also notable given the critical nature of telecom infrastructure in communications and data transmission.

Mitigation Recommendations

To mitigate Operation DRAGONCLONE, organizations should implement targeted detection and prevention strategies beyond generic controls. Specifically: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying DLL sideloading behaviors and anomalous process executions associated with VELETRIX and VShell loaders. 2) Monitor network traffic for unusual callback patterns, especially those involving obfuscated IP addresses or connections to known command and control infrastructure linked to China-nexus groups. 3) Employ threat hunting focused on indicators of compromise related to UNC5174 and Earth Lamia toolsets, including SuperShell and Cobalt Strike artifacts. 4) Harden email and file-sharing gateways to detect and block malicious ZIP files containing executables and DLLs, using sandboxing and behavioral analysis. 5) Enforce strict credential hygiene, including multi-factor authentication and regular credential audits, to limit the impact of credential theft. 6) Conduct regular threat intelligence updates and share information with industry peers and government agencies to stay informed about evolving tactics. 7) Implement network segmentation to limit lateral movement and restrict access to critical telecom infrastructure components. 8) Train security teams on recognizing advanced evasion techniques such as IPFuscation and DLL sideloading to improve incident response readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/operation-dragonclone-chinese-telecom-veletrix-vshell-malware/"]
Adversary
China-Nexus
Pulse Id
6842f45696f96557e5f757b1
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0668293c9f523f26babc09617063493b
hash241f0748c8eec5bd7c6bf52a9a6ac1dd
hash3199796dc2ad51da41da51de58d31012
hash81f76f83d4c571fe95772f21aff4d0b9
hash37a37bc7255089fdd000feb10780c2513c4416c8
hashba8e2015fd0abe944d6b546088451ff05dd24849
hashea97ee5f81f157e2ecf729b6c43f0997c3af20d3
hashf8cf927cb2baf893b136bc5d90535d193fc73b75
hash2206cc6bd9d15cf898f175ab845b3deb4b8627102b74e1accefe7a3ff0017112
hash40450b4212481492d2213d109a0cd0f42de8e813de42d53360da7efac7249df4
hash645f9f81eb83e52bbbd0726e5bf418f8235dd81ba01b6a945f8d6a31bf406992
hasha0f4ee6ea58a8896d2914176d2bfbdb9e16b700f52d2df1f77fe6ce663c1426a
hashac6e0ee1328cfb1b6ca0541e4dfe7ba6398ea79a300c4019253bd908ab6a3dc0
hashba4f9b324809876f906f3cb9b90f8af2f97487167beead549a8cddfd9a7c2fdc
hashbb6ab67ddbb74e7afb82bb063744a91f3fecf5fd0f453a179c0776727f6870c7

Ip

ValueDescriptionCopy
ip47.115.51.44
ip47.123.7.206

Threat ID: 68433b1b71f4d251b5d94948

Added to database: 6/6/2025, 7:01:47 PM

Last enriched: 2/26/2026, 9:45:48 AM

Last updated: 3/23/2026, 7:12:35 PM

Views: 269

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses