Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Silver Dragon Targets Organizations in Southeast Asia and Europe

0
Medium
Published: Tue Mar 03 2026 (03/03/2026, 20:03:17 UTC)
Source: AlienVault OTX General

Description

Check Point Research has identified a Chinese-nexus advanced persistent threat group named Silver Dragon, targeting organizations in Southeast Asia and Europe since mid-2024. The group, likely operating under APT41, exploits public-facing servers and uses phishing emails for initial access. They deploy custom tools including GearDoor, a backdoor using Google Drive for command and control, SSHcmd for remote access, and SilverScreen for covert screen monitoring. Silver Dragon primarily focuses on government entities, utilizing Cobalt Strike beacons and DNS tunneling for communication. The group's sophisticated tactics and evolving toolkit demonstrate a well-resourced and adaptable threat actor.

AI-Powered Analysis

AILast updated: 03/04/2026, 11:32:58 UTC

Technical Analysis

Silver Dragon is an advanced persistent threat group with a Chinese nexus, identified by Check Point Research as likely operating under the APT41 umbrella. Active since mid-2024, the group targets government organizations primarily in Southeast Asia and Europe. Their initial access vectors include exploitation of vulnerabilities in public-facing servers and spear-phishing campaigns. Once inside, Silver Dragon deploys a suite of custom tools: GearDoor, a backdoor that leverages Google Drive as a command and control (C2) channel, enabling covert data exfiltration and remote command execution; SSHcmd, which facilitates remote access and lateral movement within compromised networks; and SilverScreen, a tool designed for covert screen monitoring to capture sensitive information visually. The group also uses Cobalt Strike beacons, a common penetration testing tool repurposed for malicious use, and DNS tunneling techniques to evade network detection and maintain persistent communications with their infrastructure. Their tactics include a broad range of techniques mapped to MITRE ATT&CK, such as credential dumping, process injection, and scheduled task execution, reflecting a sophisticated and adaptable threat actor. Despite the absence of publicly known exploits, the combination of custom malware, stealthy communication methods, and targeted phishing campaigns underscores a significant threat to high-value government targets in the specified regions.

Potential Impact

The Silver Dragon threat poses considerable risks to government organizations in Southeast Asia and Europe, potentially leading to unauthorized access to sensitive government data, espionage, and disruption of critical services. The use of advanced custom tools and stealthy communication channels like Google Drive-based C2 and DNS tunneling complicates detection and response efforts. Compromise could result in loss of confidentiality through data exfiltration, integrity attacks via manipulation of government data, and availability impacts if critical systems are disrupted or controlled by the attacker. The targeting of government entities suggests potential geopolitical motivations, increasing the risk of prolonged campaigns and sophisticated countermeasures by the adversary. Organizations may face reputational damage, operational disruption, and national security implications if defenses fail to detect or mitigate this threat effectively.

Mitigation Recommendations

Organizations should implement a multi-layered defense strategy tailored to the specific tactics used by Silver Dragon. This includes rigorous patch management and vulnerability scanning of all public-facing servers to prevent exploitation. Deploy advanced email security solutions with phishing detection capabilities and conduct regular user awareness training focused on spear-phishing risks. Network monitoring should include detection of anomalous DNS traffic indicative of tunneling and inspection of outbound connections to cloud services like Google Drive for unusual activity. Endpoint detection and response (EDR) tools should be configured to identify behaviors associated with Cobalt Strike, process injection, and credential dumping. Implement strict access controls and multi-factor authentication (MFA) for remote access tools such as SSH. Regular threat hunting exercises focusing on indicators of compromise related to Silver Dragon’s toolset can improve early detection. Finally, establish incident response plans that include procedures for containment and eradication of advanced persistent threats, and collaborate with regional cybersecurity agencies for threat intelligence sharing.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2026/silver-dragon-targets-organizations-in-southeast-asia-and-europe/"]
Adversary
Silver Dragon
Pulse Id
69a73e8545dc6a32312482a1
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash876e6bca4c322db479d00152a5c8231a
hash9d3f61dcaba90db2ede1c1906a80ace2
hashc093b163f86d35c7cc3f2966d4a5ec5f8ce77980
hash166e777cb72a7c4e126f8ed97e0a82e7ca9e87df7793fea811daf34e1e7e47a6
hash16b9a7358be88632378ba20ba1430786f3b844694b1f876211ecdbecf5cccbc2
hash19139a525ee9c22efd6a4842c4cd50ab2c5f9ee391e5531071df0bb4e685f55d
hash2f787c1454891b242ab221b8b8b420373c3eb1a0c1fdcb624dd800c50758bbb0
hash3128bdb8efaaa04c0ba96337252f4cc2dc795021cbc410f74ace9dde958bac1d
hash37b485ed8d150d022c41e5e307b8c54c34ef806625b44d0c940b18be7d5b29ce
hash3a2df7a2cfeca5ba315a29cf313268a53a22316c925e6b9760ead8f4df0d1f75
hash3e2a0bafbd44e24b17fd7b17c9f2b2a3727349971d42612d55bbc1732082619a
hash43f8f94ca5aa0af7bfb0cc1d2f664a46500a161b2d082b48b516d084ef485348
hash44e769efed3e4f9f04c52dcd13f15cead251a1a08827a2cb6ea68427522c7fbb
hash4f93be0c46a53701b1777ab8df874c837df3d8256e026f138d60fc2932e569a8
hash51684a0e356513486489986f5832c948107ff687c8501d64846cdc4307429413
hash5341c7256542405abdd01ee288b08e49dcb6d1782be6b7bea63b459d80f9a8f5
hash568c67564d62b09d1a1bc29a494cf4bf31afddcafcf78592b178c63f23ccfcae
hash5ad857df8976523cb3ad2fdf30e87c0e7daa64135716b139ffdcd209b98e1654
hash72e4b6540e32b8b7aac850055609bc5afc19e29834e9aa6be29a8ea59a2c9785
hash7384462d420bdc9683a4cac2a8ad19353a2aa7d2244c91e9182345777e811e33
hash740a09fcdefa5a5f79355b720f54ff09efa64062229fb388adbccd9c829e9ff0
hash74a11a07d167f8f5c0baa724d1f7708985c81d0ac3d0e4d7ef3f3220c335e009
hash7f89a4d5af47bc00a9ad58f0bcbe8a7be2662953dcd03f0e881cc5cbf6b7bca8
hash85a03d2e74ae84093a74699057693d11e5c61f85b62e741778cbc5fc9f89022f
hash8c29f9189a9ad75a959024f59e68c62d42a6fd42f9eacf847128c7efe4ef7578
hash948468aba5c851952ebe56a5bf37904ed83a6c8cb520304db6938d79892f0a1b
hash967b5c611d304385807ea2d865fa561c15cde0473dd63e768679a4f29f0e4563
hasha6b5448ba45f3f352f5f4c5376024891adda1ef8ebf62a8fe63424fa230c691d
hashb93560c4d18120e113fb8b04a8aa05f66a12116d1fbf18a93186f6314381e97e
hashbcbe2f0a8134c0e7fce18d0394ababc1d910e6f7b77b8c07643434cd14f4c5d6
hashbd699ed720e2bd7085b3444cb8f4d36870b5b48df1055ec6cc1553db3eef7faf
hashc4de1f1a8cb3b0392802ee56096ddb25b6f51c51350ce7c45e14d8c285765300
hashddaca57f3d5f4986da052ca172631b351410d6f5831f6af351699c6201cc011b
hashe3b016f2fc865d0f53f635f740eb0203626517425ed9a2908058f96a3bcf470d

Domain

ValueDescriptionCopy
domainampolice.org
domainbigflx.net
domaincopilot-cloud.net
domainexchange4study.com
domainmindssurpass.com
domainoicm.org
domainonedriveconsole.com
domainprotacik.com
domainrevitpourtous.com
domainsplunkds.com
domainwikipedla.blog
domainzhydromet.com
domainns1.exchange4study.com
domainns1.onedriveconsole.com
domainns2.onedriveconsole.com

Threat ID: 69a814c4d1a09e29cb2cff01

Added to database: 3/4/2026, 11:17:24 AM

Last enriched: 3/4/2026, 11:32:58 AM

Last updated: 3/5/2026, 7:01:09 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses