Skip to main content
Mallory

China-Aligned Shadow-Earth-053 Breached Exchange Servers for Long-Term Espionage

state-sponsored-espionagegovernment-diplomatic-threatinitial-access-methodpersistence-methodcredential-access-method
Updated May 1, 2026 at 04:01 PM6 sources
Share:
China-Aligned Shadow-Earth-053 Breached Exchange Servers for Long-Term Espionage

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Trend Micro disclosed that the China-aligned cluster SHADOW-EARTH-053 compromised more than a dozen organizations in at least eight countries by exploiting vulnerable Microsoft Exchange and IIS servers, including the ProxyLogon chain, then deploying GODZILLA web shells and the ShadowPad backdoor to maintain access. Victims included government agencies, defense contractors, technology firms, transportation organizations, and at least one target in Poland, with activity observed from December 2024 through April 2026. Researchers said the intrusions resemble broader Chinese state-linked operations such as Salt Typhoon and Volt Typhoon and may support long-term espionage, prepositioning, and potential future disruption.

Post-compromise activity included DLL sideloading with a renamed Toshiba Bluetooth Stack executable, registry-resident shellcode execution via EnumDesktopsA callback injection, scheduled-task persistence, mailbox collection from Exchange, credential theft, and lateral movement using tools such as IOX, GOST, Wstunnel, Sharp-SMBExec, Mimikatz, and Evil-CreateDump. Trend Micro also identified overlap with a related cluster, SHADOW-EARTH-054, including shared tool hashes, reused vulnerabilities, and compromises at some of the same organizations, although the company assessed the relationship as overlapping exploitation rather than clearly coordinated operations. Defenders were urged to patch Exchange and IIS systems quickly and review IIS worker process activity, web-shell indicators, and other signs of stealthy post-exploitation.

Timeline

  1. May 1, 2026

    Citizen Lab exposes GLITTER CARP and SEQUIN CARP phishing campaigns

    On 2026-05-01, Citizen Lab reported two China-affiliated phishing clusters, GLITTER CARP and SEQUIN CARP, targeting journalists and civil society groups including Uyghur, Tibetan, Taiwanese, and Hong Kong diaspora activists. The campaigns used impersonation and fake security alerts to steal credentials or gain OAuth access, and Citizen Lab said the activity aligned with Chinese intelligence priorities, possibly involving commercial contractors.

  2. Apr 30, 2026

    Researchers detail DEEP#DOOR credential theft and evasion features

    Securonix reported that DEEP#DOOR can steal browser passwords, cloud credentials, SSH keys, and Wi-Fi credentials while also patching AMSI and ETW, tampering with Defender, bypassing SmartScreen, clearing logs, and unhooking NTDLL. Researchers described it as a full-featured RAT suitable for long-term persistence, espionage, lateral movement, and post-exploitation, though the scale of attacks was unknown.

  3. Apr 30, 2026

    Securonix discloses DEEP#DOOR Python backdoor framework

    On April 30, 2026, Securonix revealed a newly identified Python-based Windows malware framework called DEEP#DOOR. The malware uses obfuscated batch scripts for delivery, establishes persistence through multiple Windows mechanisms, and uses the public tunneling service bore[.]pub for command-and-control.

  4. Apr 30, 2026

    Trend Micro publicly discloses Shadow-Earth-053 campaign

    On April 30, 2026, Trend Micro published research detailing the Shadow-Earth-053 espionage campaign, its victimology, tooling, and links to Shadow-Earth-054. The company assessed the activity as aligned with China's strategic interests and urged organizations to patch Exchange and IIS systems or apply compensating controls.

  5. Apr 30, 2026

    Overlap with related cluster Shadow-Earth-054 is identified

    Researchers linked roughly half of the victims to a related cluster, Shadow-Earth-054, based on shared vulnerabilities, tool hashes, and overlapping tradecraft. Trend Micro assessed the relationship as overlapping but most likely independent exploitation of the same opportunities rather than coordinated operations.

  6. Apr 1, 2026

    Shadow-Earth-053 activity is still observed

    Trend Micro reported that Shadow-Earth-053 intrusions were still being observed in April 2026, indicating the campaign remained active well over a year after it began. Researchers warned the operations resembled long-term Chinese espionage and possible prepositioning activity.

  7. Dec 1, 2024

    Shadow-Earth-053 conducts post-exploitation espionage operations

    Following initial compromise, the attackers used DLL sideloading, registry-resident shellcode, scheduled tasks, credential theft, lateral movement, and mailbox collection from Exchange environments. Tooling observed included IOX, GOST, Wstunnel, Sharp-SMBExec, Mimikatz, Evil-CreateDump, WMIC, and a custom ExchangeExport utility.

  8. Dec 1, 2024

    Attackers exploit Exchange and IIS flaws to establish access

    The campaign gained initial access by exploiting vulnerable or unpatched Microsoft Exchange and IIS servers, including the ProxyLogon vulnerability chain. After compromise, operators deployed web shells such as GODZILLA and used ShadowPad to maintain long-term access.

  9. Dec 1, 2024

    Shadow-Earth-053 begins intrusions across Asia and Poland

    Trend Micro said the China-aligned cluster Shadow-Earth-053 had been active since at least December 2024, compromising more than a dozen organizations in at least eight countries. Targets included government agencies, defense contractors, technology firms, transportation organizations, and at least one victim in Poland.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

TGR-STA-1030 “Shadow Campaigns” Global Cyberespionage Using ShadowGuard Rootkit

TGR-STA-1030 “Shadow Campaigns” Global Cyberespionage Using ShadowGuard Rootkit

A large-scale cyberespionage operation tracked as **TGR-STA-1030** (also **UNC6619**) has been reported compromising government and critical-infrastructure organizations across **37 countries**, with broader reconnaissance activity against government infrastructure in **155 countries**. The operation—described as “**Shadow Campaigns**”—uses **phishing** (often impersonating government entities) and **N-day vulnerability exploitation** across multiple enterprise and edge products (including **SAP**, **Microsoft Exchange**, and **D-Link**) to gain initial access, then deploys tooling for persistence, lateral movement, and stealth. Post-compromise activity includes deployment of **Diaoyu Loader** to stage frameworks and remote admin tooling such as **Cobalt Strike** and **VShell**, plus web shells and tunneling utilities. A notable capability is **ShadowGuard**, a **Linux eBPF rootkit** used for kernel-level stealth. Reporting also indicates Palo Alto Networks’ Unit 42 assessed the actor as **state-aligned and operating out of Asia**, citing indicators such as tooling, language preferences, activity patterns aligned to **GMT+8**, and infrastructure linkages; separate reporting claims Unit 42 initially connected the campaign more directly to **China** but softened public attribution due to concerns about potential retaliation following Chinese restrictions on certain foreign cybersecurity vendors’ software.

1 months ago
Chinese Espionage Campaign CL-UNK-1068 Targeting Asian Critical Infrastructure via Web Server Exploitation

Chinese Espionage Campaign CL-UNK-1068 Targeting Asian Critical Infrastructure via Web Server Exploitation

Palo Alto Networks Unit 42 reported a **previously undocumented Chinese threat actor**, tracked as **CL-UNK-1068**, conducting a multi-year intrusion campaign (observed since at least 2020) against high-value organizations across **South, Southeast, and East Asia**. Targeted sectors include **aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications**, with Unit 42 assessing **moderate-to-high confidence** that the primary objective is **cyber espionage** (while not fully ruling out criminal motives). The assessment cites tool provenance, linguistic artifacts in configurations, and consistent long-term targeting of Asian critical infrastructure as key factors supporting attribution. The activity features exploitation of **internet-facing web servers** to deploy **web shells** and establish persistence across both Windows and Linux environments, using a mix of custom malware, modified open-source tools, and **living-off-the-land binaries (LOLBINs)**. Reported tooling includes **Godzilla** and **ANTSWORD** web shells, the **Xnote** Linux backdoor, and **Fast Reverse Proxy (FRP)** for tunneling/relay; post-compromise behavior includes lateral movement and targeted file theft from Windows web servers (e.g., `c:\inetpub\wwwroot`) focusing on files such as `web.config`, `.aspx`, `.asmx`, `.asax`, and `.dll`, consistent with credential access and follow-on exploitation discovery.

1 months ago
Multiple APT and malware campaigns abusing phishing, cloud services, and signed binaries

Multiple APT and malware campaigns abusing phishing, cloud services, and signed binaries

Reporting across multiple research teams described a surge of distinct, ongoing intrusion campaigns rather than a single unified incident. **Check Point** reported on **Silver Dragon**, a Chinese-aligned activity cluster assessed as operating under the broader **APT41** umbrella, targeting organizations in **Southeast Asia and Europe** (notably government) via exploitation of public-facing servers and phishing, then deploying **Cobalt Strike**, **DNS tunneling**, and a new Google Drive–based backdoor (**GearDoor**) alongside custom tools (**SSHcmd** and **SliverScreen**) for remote access and screen capture. **Microsoft** detailed separate February 2026 phishing campaigns by an unknown actor that used meeting/invoice-style lures and **EV code-signed** malware (certificate issued to **TrustConnect Software PTY LTD**) masquerading as common workplace apps (e.g., `msteams.exe`, `adobereader.exe`, `zoomworkspace.clientsetup.exe`) to install legitimate **RMM** tooling (**ScreenConnect**, **Tactical RMM**, **Mesh Agent**) for persistent access and lateral movement. Other reporting highlighted additional, unrelated campaigns and tradecraft: **ClearSky** described a Russian-aligned operation targeting **Ukraine** using a phishing-delivered ZIP/HTA chain that drops a .NET loader (**BadPaw**) and backdoor (**MeowMeow**) with **.NET Reactor** obfuscation, parameter-gated execution, and sandbox/tooling checks (with low-confidence linkage to **APT28**). **Cofense**-reported activity (via SC Media) showed phishing that weaponizes **Windows File Explorer + WebDAV** using URL/LNK shortcuts to pull payloads (notably **AsyncRAT**, **XWorm**, **DcRAT**) and infrastructure including **Cloudflare Tunnel** domains hosting WebDAV servers. **Cisco Talos**-reported **Dohdoor** activity (UAT-10027) targeted US **education and healthcare**, using PowerShell→batch→DLL sideloading via legitimate executables (e.g., `Fondue.exe`, `mblctr.exe`, `ScreenClippingHost.exe`) and **DNS-over-HTTPS** to Cloudflare for C2 discovery and tunneling. Separately, **Zscaler** reported **ScarCruft**’s *Ruby Jumper* campaign using **Zoho WorkDrive** for C2 and removable media components to reach air-gapped systems, while another Zscaler report analyzed **Dust Specter** targeting Iraqi government officials with password-protected RAR delivery and modular implants. **Qianxin XLab** assessed sanctioned infrastructure provider **Funnull** resurfacing to support scam/criminal supply chains and potential **MacCMS**-related supply-chain activity, and **F5 Labs** summarized **APT42**’s **TAMECAT** PowerShell backdoor focused on Edge/Chrome credential theft with C2 over Telegram/Discord/HTTPS and specific file/hash indicators. (A separate Help Net Security item on a Microsoft Defender onboarding tool is product/administrative news and not part of the threat-campaign reporting.)

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.