Operation DRAGONCLONE: Chinese Telecom Targeted by Malware
Operation DRAGONCLONE is an advanced cyber espionage campaign targeting China Mobile Tietong and potentially European telecom organizations connected to Chinese infrastructure. It uses sophisticated malware loaders like VELETRIX and the VShell adversary simulation tool, delivered via malicious ZIP files exploiting DLL sideloading and anti-analysis techniques such as IPFuscation. The campaign is linked to China-nexus threat groups UNC5174 (Uteus) and Earth Lamia and employs tools including SuperShell, Cobalt Strike, and Asset Lighthouse System. Active since March 2025, it focuses on credential theft, network reconnaissance, and callback execution. Detection requires monitoring for specific malware behaviors, DLL sideloading, and network callbacks. Germany, France, and the UK are at heightened risk due to their telecom sectors and economic ties to China. The threat is assessed as high severity given its advanced evasion, espionage intent, and potential impact on critical telecom infrastructure.
AI Analysis
Technical Summary
Operation DRAGONCLONE represents a sophisticated cyber espionage campaign primarily targeting China Mobile Tietong, a subsidiary of China Mobile, and potentially extending to European telecom organizations with supply chain or infrastructure ties to Chinese telecom entities. The attack vector begins with a malicious ZIP archive containing executables and DLLs designed to exploit DLL sideloading vulnerabilities, allowing malicious code to run under the guise of legitimate applications. The campaign employs advanced anti-analysis techniques such as IPFuscation, which obfuscates IP addresses to evade network detection and analysis tools. The malware loaders VELETRIX and the VShell adversary simulation tool are central to the attack, facilitating payload delivery and execution. The threat actors behind this campaign are linked to China-nexus groups UNC5174 (also known as Uteus) and Earth Lamia, known for their targeted espionage operations. Additional tools used include SuperShell, Cobalt Strike (a well-known post-exploitation framework), and the Asset Lighthouse System, which likely aids in network reconnaissance and lateral movement. The campaign has been active since March 2025 and focuses on stealing credentials, conducting network reconnaissance to map and understand the target environment, and executing callbacks to command and control servers for further instructions. Detection is challenging due to the use of DLL sideloading and IPFuscation, requiring defenders to monitor for anomalous DLL loading behaviors, unusual network callback patterns, and the presence of VELETRIX and VShell-related activities. The campaign’s targeting of telecom infrastructure, a critical sector for national security and economic stability, combined with its advanced evasion techniques, underscores its high threat level. European countries with significant telecom infrastructure and economic connections to China, such as Germany, France, and the UK, are considered at elevated risk.
Potential Impact
The potential impact of Operation DRAGONCLONE is significant for organizations involved in telecom infrastructure, particularly those linked to China Mobile Tietong or with supply chain connections to Chinese telecom entities. Successful exploitation can lead to credential theft, enabling attackers to gain persistent access and escalate privileges within networks. Network reconnaissance activities can expose sensitive internal architecture and operational details, facilitating further attacks or espionage. The use of callback execution allows attackers to maintain command and control, potentially leading to data exfiltration, disruption of services, or deployment of additional malware. For telecom providers, this could mean compromised customer data, degraded network integrity, and loss of trust. European telecom organizations with economic ties to China may face secondary risks, including supply chain compromises and espionage targeting intellectual property or strategic communications. The campaign’s advanced evasion techniques complicate detection and response, increasing the likelihood of prolonged undetected presence and greater damage. National security implications are also notable given the critical nature of telecom infrastructure in communications and data transmission.
Mitigation Recommendations
To mitigate Operation DRAGONCLONE, organizations should implement targeted detection and prevention strategies beyond generic controls. Specifically: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying DLL sideloading behaviors and anomalous process executions associated with VELETRIX and VShell loaders. 2) Monitor network traffic for unusual callback patterns, especially those involving obfuscated IP addresses or connections to known command and control infrastructure linked to China-nexus groups. 3) Employ threat hunting focused on indicators of compromise related to UNC5174 and Earth Lamia toolsets, including SuperShell and Cobalt Strike artifacts. 4) Harden email and file-sharing gateways to detect and block malicious ZIP files containing executables and DLLs, using sandboxing and behavioral analysis. 5) Enforce strict credential hygiene, including multi-factor authentication and regular credential audits, to limit the impact of credential theft. 6) Conduct regular threat intelligence updates and share information with industry peers and government agencies to stay informed about evolving tactics. 7) Implement network segmentation to limit lateral movement and restrict access to critical telecom infrastructure components. 8) Train security teams on recognizing advanced evasion techniques such as IPFuscation and DLL sideloading to improve incident response readiness.
Affected Countries
China, Germany, France, United Kingdom
Indicators of Compromise
- hash: 0668293c9f523f26babc09617063493b
- hash: 241f0748c8eec5bd7c6bf52a9a6ac1dd
- hash: 3199796dc2ad51da41da51de58d31012
- hash: 81f76f83d4c571fe95772f21aff4d0b9
- hash: 37a37bc7255089fdd000feb10780c2513c4416c8
- hash: ba8e2015fd0abe944d6b546088451ff05dd24849
- hash: ea97ee5f81f157e2ecf729b6c43f0997c3af20d3
- hash: f8cf927cb2baf893b136bc5d90535d193fc73b75
- hash: 2206cc6bd9d15cf898f175ab845b3deb4b8627102b74e1accefe7a3ff0017112
- hash: 40450b4212481492d2213d109a0cd0f42de8e813de42d53360da7efac7249df4
- hash: 645f9f81eb83e52bbbd0726e5bf418f8235dd81ba01b6a945f8d6a31bf406992
- hash: a0f4ee6ea58a8896d2914176d2bfbdb9e16b700f52d2df1f77fe6ce663c1426a
- hash: ac6e0ee1328cfb1b6ca0541e4dfe7ba6398ea79a300c4019253bd908ab6a3dc0
- hash: ba4f9b324809876f906f3cb9b90f8af2f97487167beead549a8cddfd9a7c2fdc
- hash: bb6ab67ddbb74e7afb82bb063744a91f3fecf5fd0f453a179c0776727f6870c7
- ip: 47.115.51.44
- ip: 47.123.7.206
Operation DRAGONCLONE: Chinese Telecom Targeted by Malware
Description
Operation DRAGONCLONE is an advanced cyber espionage campaign targeting China Mobile Tietong and potentially European telecom organizations connected to Chinese infrastructure. It uses sophisticated malware loaders like VELETRIX and the VShell adversary simulation tool, delivered via malicious ZIP files exploiting DLL sideloading and anti-analysis techniques such as IPFuscation. The campaign is linked to China-nexus threat groups UNC5174 (Uteus) and Earth Lamia and employs tools including SuperShell, Cobalt Strike, and Asset Lighthouse System. Active since March 2025, it focuses on credential theft, network reconnaissance, and callback execution. Detection requires monitoring for specific malware behaviors, DLL sideloading, and network callbacks. Germany, France, and the UK are at heightened risk due to their telecom sectors and economic ties to China. The threat is assessed as high severity given its advanced evasion, espionage intent, and potential impact on critical telecom infrastructure.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Operation DRAGONCLONE represents a sophisticated cyber espionage campaign primarily targeting China Mobile Tietong, a subsidiary of China Mobile, and potentially extending to European telecom organizations with supply chain or infrastructure ties to Chinese telecom entities. The attack vector begins with a malicious ZIP archive containing executables and DLLs designed to exploit DLL sideloading vulnerabilities, allowing malicious code to run under the guise of legitimate applications. The campaign employs advanced anti-analysis techniques such as IPFuscation, which obfuscates IP addresses to evade network detection and analysis tools. The malware loaders VELETRIX and the VShell adversary simulation tool are central to the attack, facilitating payload delivery and execution. The threat actors behind this campaign are linked to China-nexus groups UNC5174 (also known as Uteus) and Earth Lamia, known for their targeted espionage operations. Additional tools used include SuperShell, Cobalt Strike (a well-known post-exploitation framework), and the Asset Lighthouse System, which likely aids in network reconnaissance and lateral movement. The campaign has been active since March 2025 and focuses on stealing credentials, conducting network reconnaissance to map and understand the target environment, and executing callbacks to command and control servers for further instructions. Detection is challenging due to the use of DLL sideloading and IPFuscation, requiring defenders to monitor for anomalous DLL loading behaviors, unusual network callback patterns, and the presence of VELETRIX and VShell-related activities. The campaign’s targeting of telecom infrastructure, a critical sector for national security and economic stability, combined with its advanced evasion techniques, underscores its high threat level. European countries with significant telecom infrastructure and economic connections to China, such as Germany, France, and the UK, are considered at elevated risk.
Potential Impact
The potential impact of Operation DRAGONCLONE is significant for organizations involved in telecom infrastructure, particularly those linked to China Mobile Tietong or with supply chain connections to Chinese telecom entities. Successful exploitation can lead to credential theft, enabling attackers to gain persistent access and escalate privileges within networks. Network reconnaissance activities can expose sensitive internal architecture and operational details, facilitating further attacks or espionage. The use of callback execution allows attackers to maintain command and control, potentially leading to data exfiltration, disruption of services, or deployment of additional malware. For telecom providers, this could mean compromised customer data, degraded network integrity, and loss of trust. European telecom organizations with economic ties to China may face secondary risks, including supply chain compromises and espionage targeting intellectual property or strategic communications. The campaign’s advanced evasion techniques complicate detection and response, increasing the likelihood of prolonged undetected presence and greater damage. National security implications are also notable given the critical nature of telecom infrastructure in communications and data transmission.
Mitigation Recommendations
To mitigate Operation DRAGONCLONE, organizations should implement targeted detection and prevention strategies beyond generic controls. Specifically: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of identifying DLL sideloading behaviors and anomalous process executions associated with VELETRIX and VShell loaders. 2) Monitor network traffic for unusual callback patterns, especially those involving obfuscated IP addresses or connections to known command and control infrastructure linked to China-nexus groups. 3) Employ threat hunting focused on indicators of compromise related to UNC5174 and Earth Lamia toolsets, including SuperShell and Cobalt Strike artifacts. 4) Harden email and file-sharing gateways to detect and block malicious ZIP files containing executables and DLLs, using sandboxing and behavioral analysis. 5) Enforce strict credential hygiene, including multi-factor authentication and regular credential audits, to limit the impact of credential theft. 6) Conduct regular threat intelligence updates and share information with industry peers and government agencies to stay informed about evolving tactics. 7) Implement network segmentation to limit lateral movement and restrict access to critical telecom infrastructure components. 8) Train security teams on recognizing advanced evasion techniques such as IPFuscation and DLL sideloading to improve incident response readiness.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/operation-dragonclone-chinese-telecom-veletrix-vshell-malware/"]
- Adversary
- China-Nexus
- Pulse Id
- 6842f45696f96557e5f757b1
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0668293c9f523f26babc09617063493b | — | |
hash241f0748c8eec5bd7c6bf52a9a6ac1dd | — | |
hash3199796dc2ad51da41da51de58d31012 | — | |
hash81f76f83d4c571fe95772f21aff4d0b9 | — | |
hash37a37bc7255089fdd000feb10780c2513c4416c8 | — | |
hashba8e2015fd0abe944d6b546088451ff05dd24849 | — | |
hashea97ee5f81f157e2ecf729b6c43f0997c3af20d3 | — | |
hashf8cf927cb2baf893b136bc5d90535d193fc73b75 | — | |
hash2206cc6bd9d15cf898f175ab845b3deb4b8627102b74e1accefe7a3ff0017112 | — | |
hash40450b4212481492d2213d109a0cd0f42de8e813de42d53360da7efac7249df4 | — | |
hash645f9f81eb83e52bbbd0726e5bf418f8235dd81ba01b6a945f8d6a31bf406992 | — | |
hasha0f4ee6ea58a8896d2914176d2bfbdb9e16b700f52d2df1f77fe6ce663c1426a | — | |
hashac6e0ee1328cfb1b6ca0541e4dfe7ba6398ea79a300c4019253bd908ab6a3dc0 | — | |
hashba4f9b324809876f906f3cb9b90f8af2f97487167beead549a8cddfd9a7c2fdc | — | |
hashbb6ab67ddbb74e7afb82bb063744a91f3fecf5fd0f453a179c0776727f6870c7 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip47.115.51.44 | — | |
ip47.123.7.206 | — |
Threat ID: 68433b1b71f4d251b5d94948
Added to database: 6/6/2025, 7:01:47 PM
Last enriched: 2/26/2026, 9:45:48 AM
Last updated: 3/23/2026, 7:12:35 PM
Views: 269
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.