Silver Dragon Targets Organizations in Southeast Asia and Europe
Check Point Research has identified a Chinese-nexus advanced persistent threat group named Silver Dragon, targeting organizations in Southeast Asia and Europe since mid-2024. The group, likely operating under APT41, exploits public-facing servers and uses phishing emails for initial access. They deploy custom tools including GearDoor, a backdoor using Google Drive for command and control, SSHcmd for remote access, and SilverScreen for covert screen monitoring. Silver Dragon primarily focuses on government entities, utilizing Cobalt Strike beacons and DNS tunneling for communication. The group's sophisticated tactics and evolving toolkit demonstrate a well-resourced and adaptable threat actor.
AI Analysis
Technical Summary
Silver Dragon is an advanced persistent threat group with a Chinese nexus, identified by Check Point Research as likely operating under the APT41 umbrella. Active since mid-2024, the group targets government organizations primarily in Southeast Asia and Europe. Their initial access vectors include exploitation of vulnerabilities in public-facing servers and spear-phishing campaigns. Once inside, Silver Dragon deploys a suite of custom tools: GearDoor, a backdoor that leverages Google Drive as a command and control (C2) channel, enabling covert data exfiltration and remote command execution; SSHcmd, which facilitates remote access and lateral movement within compromised networks; and SilverScreen, a tool designed for covert screen monitoring to capture sensitive information visually. The group also uses Cobalt Strike beacons, a common penetration testing tool repurposed for malicious use, and DNS tunneling techniques to evade network detection and maintain persistent communications with their infrastructure. Their tactics include a broad range of techniques mapped to MITRE ATT&CK, such as credential dumping, process injection, and scheduled task execution, reflecting a sophisticated and adaptable threat actor. Despite the absence of publicly known exploits, the combination of custom malware, stealthy communication methods, and targeted phishing campaigns underscores a significant threat to high-value government targets in the specified regions.
Potential Impact
The Silver Dragon threat poses considerable risks to government organizations in Southeast Asia and Europe, potentially leading to unauthorized access to sensitive government data, espionage, and disruption of critical services. The use of advanced custom tools and stealthy communication channels like Google Drive-based C2 and DNS tunneling complicates detection and response efforts. Compromise could result in loss of confidentiality through data exfiltration, integrity attacks via manipulation of government data, and availability impacts if critical systems are disrupted or controlled by the attacker. The targeting of government entities suggests potential geopolitical motivations, increasing the risk of prolonged campaigns and sophisticated countermeasures by the adversary. Organizations may face reputational damage, operational disruption, and national security implications if defenses fail to detect or mitigate this threat effectively.
Mitigation Recommendations
Organizations should implement a multi-layered defense strategy tailored to the specific tactics used by Silver Dragon. This includes rigorous patch management and vulnerability scanning of all public-facing servers to prevent exploitation. Deploy advanced email security solutions with phishing detection capabilities and conduct regular user awareness training focused on spear-phishing risks. Network monitoring should include detection of anomalous DNS traffic indicative of tunneling and inspection of outbound connections to cloud services like Google Drive for unusual activity. Endpoint detection and response (EDR) tools should be configured to identify behaviors associated with Cobalt Strike, process injection, and credential dumping. Implement strict access controls and multi-factor authentication (MFA) for remote access tools such as SSH. Regular threat hunting exercises focusing on indicators of compromise related to Silver Dragon’s toolset can improve early detection. Finally, establish incident response plans that include procedures for containment and eradication of advanced persistent threats, and collaborate with regional cybersecurity agencies for threat intelligence sharing.
Affected Countries
Indonesia, Malaysia, Singapore, Thailand, Vietnam, Philippines, United Kingdom, Germany, France, Netherlands, Belgium
Indicators of Compromise
- hash: 876e6bca4c322db479d00152a5c8231a
- hash: 9d3f61dcaba90db2ede1c1906a80ace2
- hash: c093b163f86d35c7cc3f2966d4a5ec5f8ce77980
- hash: 166e777cb72a7c4e126f8ed97e0a82e7ca9e87df7793fea811daf34e1e7e47a6
- hash: 16b9a7358be88632378ba20ba1430786f3b844694b1f876211ecdbecf5cccbc2
- hash: 19139a525ee9c22efd6a4842c4cd50ab2c5f9ee391e5531071df0bb4e685f55d
- hash: 2f787c1454891b242ab221b8b8b420373c3eb1a0c1fdcb624dd800c50758bbb0
- hash: 3128bdb8efaaa04c0ba96337252f4cc2dc795021cbc410f74ace9dde958bac1d
- hash: 37b485ed8d150d022c41e5e307b8c54c34ef806625b44d0c940b18be7d5b29ce
- hash: 3a2df7a2cfeca5ba315a29cf313268a53a22316c925e6b9760ead8f4df0d1f75
- hash: 3e2a0bafbd44e24b17fd7b17c9f2b2a3727349971d42612d55bbc1732082619a
- hash: 43f8f94ca5aa0af7bfb0cc1d2f664a46500a161b2d082b48b516d084ef485348
- hash: 44e769efed3e4f9f04c52dcd13f15cead251a1a08827a2cb6ea68427522c7fbb
- hash: 4f93be0c46a53701b1777ab8df874c837df3d8256e026f138d60fc2932e569a8
- hash: 51684a0e356513486489986f5832c948107ff687c8501d64846cdc4307429413
- hash: 5341c7256542405abdd01ee288b08e49dcb6d1782be6b7bea63b459d80f9a8f5
- hash: 568c67564d62b09d1a1bc29a494cf4bf31afddcafcf78592b178c63f23ccfcae
- hash: 5ad857df8976523cb3ad2fdf30e87c0e7daa64135716b139ffdcd209b98e1654
- hash: 72e4b6540e32b8b7aac850055609bc5afc19e29834e9aa6be29a8ea59a2c9785
- hash: 7384462d420bdc9683a4cac2a8ad19353a2aa7d2244c91e9182345777e811e33
- hash: 740a09fcdefa5a5f79355b720f54ff09efa64062229fb388adbccd9c829e9ff0
- hash: 74a11a07d167f8f5c0baa724d1f7708985c81d0ac3d0e4d7ef3f3220c335e009
- hash: 7f89a4d5af47bc00a9ad58f0bcbe8a7be2662953dcd03f0e881cc5cbf6b7bca8
- hash: 85a03d2e74ae84093a74699057693d11e5c61f85b62e741778cbc5fc9f89022f
- hash: 8c29f9189a9ad75a959024f59e68c62d42a6fd42f9eacf847128c7efe4ef7578
- hash: 948468aba5c851952ebe56a5bf37904ed83a6c8cb520304db6938d79892f0a1b
- hash: 967b5c611d304385807ea2d865fa561c15cde0473dd63e768679a4f29f0e4563
- hash: a6b5448ba45f3f352f5f4c5376024891adda1ef8ebf62a8fe63424fa230c691d
- hash: b93560c4d18120e113fb8b04a8aa05f66a12116d1fbf18a93186f6314381e97e
- hash: bcbe2f0a8134c0e7fce18d0394ababc1d910e6f7b77b8c07643434cd14f4c5d6
- hash: bd699ed720e2bd7085b3444cb8f4d36870b5b48df1055ec6cc1553db3eef7faf
- hash: c4de1f1a8cb3b0392802ee56096ddb25b6f51c51350ce7c45e14d8c285765300
- hash: ddaca57f3d5f4986da052ca172631b351410d6f5831f6af351699c6201cc011b
- hash: e3b016f2fc865d0f53f635f740eb0203626517425ed9a2908058f96a3bcf470d
- domain: ampolice.org
- domain: bigflx.net
- domain: copilot-cloud.net
- domain: exchange4study.com
- domain: mindssurpass.com
- domain: oicm.org
- domain: onedriveconsole.com
- domain: protacik.com
- domain: revitpourtous.com
- domain: splunkds.com
- domain: wikipedla.blog
- domain: zhydromet.com
- domain: ns1.exchange4study.com
- domain: ns1.onedriveconsole.com
- domain: ns2.onedriveconsole.com
Silver Dragon Targets Organizations in Southeast Asia and Europe
Description
Check Point Research has identified a Chinese-nexus advanced persistent threat group named Silver Dragon, targeting organizations in Southeast Asia and Europe since mid-2024. The group, likely operating under APT41, exploits public-facing servers and uses phishing emails for initial access. They deploy custom tools including GearDoor, a backdoor using Google Drive for command and control, SSHcmd for remote access, and SilverScreen for covert screen monitoring. Silver Dragon primarily focuses on government entities, utilizing Cobalt Strike beacons and DNS tunneling for communication. The group's sophisticated tactics and evolving toolkit demonstrate a well-resourced and adaptable threat actor.
AI-Powered Analysis
Technical Analysis
Silver Dragon is an advanced persistent threat group with a Chinese nexus, identified by Check Point Research as likely operating under the APT41 umbrella. Active since mid-2024, the group targets government organizations primarily in Southeast Asia and Europe. Their initial access vectors include exploitation of vulnerabilities in public-facing servers and spear-phishing campaigns. Once inside, Silver Dragon deploys a suite of custom tools: GearDoor, a backdoor that leverages Google Drive as a command and control (C2) channel, enabling covert data exfiltration and remote command execution; SSHcmd, which facilitates remote access and lateral movement within compromised networks; and SilverScreen, a tool designed for covert screen monitoring to capture sensitive information visually. The group also uses Cobalt Strike beacons, a common penetration testing tool repurposed for malicious use, and DNS tunneling techniques to evade network detection and maintain persistent communications with their infrastructure. Their tactics include a broad range of techniques mapped to MITRE ATT&CK, such as credential dumping, process injection, and scheduled task execution, reflecting a sophisticated and adaptable threat actor. Despite the absence of publicly known exploits, the combination of custom malware, stealthy communication methods, and targeted phishing campaigns underscores a significant threat to high-value government targets in the specified regions.
Potential Impact
The Silver Dragon threat poses considerable risks to government organizations in Southeast Asia and Europe, potentially leading to unauthorized access to sensitive government data, espionage, and disruption of critical services. The use of advanced custom tools and stealthy communication channels like Google Drive-based C2 and DNS tunneling complicates detection and response efforts. Compromise could result in loss of confidentiality through data exfiltration, integrity attacks via manipulation of government data, and availability impacts if critical systems are disrupted or controlled by the attacker. The targeting of government entities suggests potential geopolitical motivations, increasing the risk of prolonged campaigns and sophisticated countermeasures by the adversary. Organizations may face reputational damage, operational disruption, and national security implications if defenses fail to detect or mitigate this threat effectively.
Mitigation Recommendations
Organizations should implement a multi-layered defense strategy tailored to the specific tactics used by Silver Dragon. This includes rigorous patch management and vulnerability scanning of all public-facing servers to prevent exploitation. Deploy advanced email security solutions with phishing detection capabilities and conduct regular user awareness training focused on spear-phishing risks. Network monitoring should include detection of anomalous DNS traffic indicative of tunneling and inspection of outbound connections to cloud services like Google Drive for unusual activity. Endpoint detection and response (EDR) tools should be configured to identify behaviors associated with Cobalt Strike, process injection, and credential dumping. Implement strict access controls and multi-factor authentication (MFA) for remote access tools such as SSH. Regular threat hunting exercises focusing on indicators of compromise related to Silver Dragon’s toolset can improve early detection. Finally, establish incident response plans that include procedures for containment and eradication of advanced persistent threats, and collaborate with regional cybersecurity agencies for threat intelligence sharing.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2026/silver-dragon-targets-organizations-in-southeast-asia-and-europe/"]
- Adversary
- Silver Dragon
- Pulse Id
- 69a73e8545dc6a32312482a1
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash876e6bca4c322db479d00152a5c8231a | — | |
hash9d3f61dcaba90db2ede1c1906a80ace2 | — | |
hashc093b163f86d35c7cc3f2966d4a5ec5f8ce77980 | — | |
hash166e777cb72a7c4e126f8ed97e0a82e7ca9e87df7793fea811daf34e1e7e47a6 | — | |
hash16b9a7358be88632378ba20ba1430786f3b844694b1f876211ecdbecf5cccbc2 | — | |
hash19139a525ee9c22efd6a4842c4cd50ab2c5f9ee391e5531071df0bb4e685f55d | — | |
hash2f787c1454891b242ab221b8b8b420373c3eb1a0c1fdcb624dd800c50758bbb0 | — | |
hash3128bdb8efaaa04c0ba96337252f4cc2dc795021cbc410f74ace9dde958bac1d | — | |
hash37b485ed8d150d022c41e5e307b8c54c34ef806625b44d0c940b18be7d5b29ce | — | |
hash3a2df7a2cfeca5ba315a29cf313268a53a22316c925e6b9760ead8f4df0d1f75 | — | |
hash3e2a0bafbd44e24b17fd7b17c9f2b2a3727349971d42612d55bbc1732082619a | — | |
hash43f8f94ca5aa0af7bfb0cc1d2f664a46500a161b2d082b48b516d084ef485348 | — | |
hash44e769efed3e4f9f04c52dcd13f15cead251a1a08827a2cb6ea68427522c7fbb | — | |
hash4f93be0c46a53701b1777ab8df874c837df3d8256e026f138d60fc2932e569a8 | — | |
hash51684a0e356513486489986f5832c948107ff687c8501d64846cdc4307429413 | — | |
hash5341c7256542405abdd01ee288b08e49dcb6d1782be6b7bea63b459d80f9a8f5 | — | |
hash568c67564d62b09d1a1bc29a494cf4bf31afddcafcf78592b178c63f23ccfcae | — | |
hash5ad857df8976523cb3ad2fdf30e87c0e7daa64135716b139ffdcd209b98e1654 | — | |
hash72e4b6540e32b8b7aac850055609bc5afc19e29834e9aa6be29a8ea59a2c9785 | — | |
hash7384462d420bdc9683a4cac2a8ad19353a2aa7d2244c91e9182345777e811e33 | — | |
hash740a09fcdefa5a5f79355b720f54ff09efa64062229fb388adbccd9c829e9ff0 | — | |
hash74a11a07d167f8f5c0baa724d1f7708985c81d0ac3d0e4d7ef3f3220c335e009 | — | |
hash7f89a4d5af47bc00a9ad58f0bcbe8a7be2662953dcd03f0e881cc5cbf6b7bca8 | — | |
hash85a03d2e74ae84093a74699057693d11e5c61f85b62e741778cbc5fc9f89022f | — | |
hash8c29f9189a9ad75a959024f59e68c62d42a6fd42f9eacf847128c7efe4ef7578 | — | |
hash948468aba5c851952ebe56a5bf37904ed83a6c8cb520304db6938d79892f0a1b | — | |
hash967b5c611d304385807ea2d865fa561c15cde0473dd63e768679a4f29f0e4563 | — | |
hasha6b5448ba45f3f352f5f4c5376024891adda1ef8ebf62a8fe63424fa230c691d | — | |
hashb93560c4d18120e113fb8b04a8aa05f66a12116d1fbf18a93186f6314381e97e | — | |
hashbcbe2f0a8134c0e7fce18d0394ababc1d910e6f7b77b8c07643434cd14f4c5d6 | — | |
hashbd699ed720e2bd7085b3444cb8f4d36870b5b48df1055ec6cc1553db3eef7faf | — | |
hashc4de1f1a8cb3b0392802ee56096ddb25b6f51c51350ce7c45e14d8c285765300 | — | |
hashddaca57f3d5f4986da052ca172631b351410d6f5831f6af351699c6201cc011b | — | |
hashe3b016f2fc865d0f53f635f740eb0203626517425ed9a2908058f96a3bcf470d | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainampolice.org | — | |
domainbigflx.net | — | |
domaincopilot-cloud.net | — | |
domainexchange4study.com | — | |
domainmindssurpass.com | — | |
domainoicm.org | — | |
domainonedriveconsole.com | — | |
domainprotacik.com | — | |
domainrevitpourtous.com | — | |
domainsplunkds.com | — | |
domainwikipedla.blog | — | |
domainzhydromet.com | — | |
domainns1.exchange4study.com | — | |
domainns1.onedriveconsole.com | — | |
domainns2.onedriveconsole.com | — |
Threat ID: 69a814c4d1a09e29cb2cff01
Added to database: 3/4/2026, 11:17:24 AM
Last enriched: 3/4/2026, 11:32:58 AM
Last updated: 3/5/2026, 7:01:09 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-03-04
MediumMaltrail IOC for 2026-03-04
MediumHow Pirated Software Turns Helpful Employees Into Malware Delivery Agents
MediumSigned malware impersonating workplace apps deploys RMM backdoors
MediumMalicious Packagist Packages Disguised as Laravel Utilities Deploy Encrypted RAT
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.