InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: China-linked APT31 launches stealth cyber attack on Russian IT using cloud services
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > China-linked APT31 launches stealth cyber attack on Russian IT using cloud services
Technology

China-linked APT31 launches stealth cyber attack on Russian IT using cloud services

November 22, 2025 5 Min Read
Share
China-linked APT31 launches stealth cyber attack on Russian IT using cloud services
SHARE

China-affiliated Advanced Persistent Threat (APT) group known as APT31 The cause is believed to be a cyberattack that targeted Russia’s information technology (IT) sector in 2024-2025 and went undetected for a long time.

“In 2024-2025, the Russian IT sector, especially companies working as contractors and integrators of government solutions, faced a series of targeted computer attacks,” Positive Technologies researchers Daniil Grigoryan and Varvara Koloskova said in a technical report.

APT31, also known as Altaire, Bronze Vinewood, Judgment Panda, Perplexed Goblin, RedBravo, Red Keres, and Violet Typhoon (formerly known as Zirconium), is believed to have been active since at least 2010. We have a proven track record of attacking a wide range of sectors, including government, finance, aerospace and defense, high technology, construction and engineering, telecommunications, media, and insurance.

This cyber espionage group is primarily focused on gathering information that provides political, economic, and military advantage to the Chinese government and state-owned enterprises. In May 2025, a hacking group was accused by the Czech Republic of targeting the Ministry of Foreign Affairs.

Attacks targeting Russia are characterized by the use of legitimate cloud services that are popular in the country, primarily Yandex Cloud, for command and control (C2) and data exfiltration, in an attempt to blend into normal traffic and escape detection.

The adversary also allegedly planted encrypted commands and payloads on domestic and international social media profiles, while conducting attacks on weekends and holidays. In at least one attack targeting an IT company, APT31 infiltrated its network as far back as late 2022, and expanded its activity to coincide with the 2023 holiday season.

See also  New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

In another intrusion detected in December 2024, threat actors sent spear phishing emails containing RAR archives. The email contained a Windows shortcut (LNK) that launched a Cobalt Strike loader called CloudyLoader via DLL sideloading. Details of this activity were previously documented by Kaspersky Lab in July 2025, but some overlap with the threat cluster known as EastWind has been identified.

The Russian cybersecurity firm also said it had identified a ZIP archive lure disguised as a report from the Peruvian Ministry of Foreign Affairs to finally deploy CloudyLoader.

To facilitate subsequent stages of the attack cycle, APT31 leveraged a wide range of publicly available custom tools. Persistence is achieved by setting up scheduled tasks that mimic legitimate applications such as Yandex Disk or Google Chrome. Some of them are listed below.

  • SharpADUserIP, a C# utility for reconnaissance and discovery
  • SharpChrome.exe extracts passwords and cookies from Google Chrome and Microsoft Edge browsers.
  • SharpDir, search for files
  • StickyNotesExtract.exe, which extracts data from the Windows Sticky Notes database.
  • Tailscale VPN: Creates an encrypted tunnel and sets up a peer-to-peer (P2P) network between a compromised host and its infrastructure.
  • Microsoft Development Tunnel, tunnel your traffic
  • Owawa, Malicious IIS Module for Credential Theft
  • AufTime, a Linux backdoor that uses the wolfSSL library to communicate with the C2
  • COFFProxy: Golang backdoor that supports commands for tunneling traffic, executing commands, managing files, and delivering additional payloads
  • VtChatter is a tool that uses Base64-encoded comments every two hours to text files hosted on VirusTotal as a two-way C2 channel
  • OneDriveDoor, a backdoor that uses Microsoft OneDrive as a C2
  • LocalPlugX. A variant of PlugX used for spreading within local networks rather than communicating with C2.
  • CloudSorcerer, a backdoor that uses cloud services as a C2
  • YaLeak, a .NET tool for uploading information to Yandex Cloud
See also  North Korean hacker lures defense engineer with fake job to steal drone secrets

“While APT31 continues to use some of its older tools, it is constantly replenishing its arsenal,” Positive Technologies said. “As a C2, the attackers are actively using cloud services, especially Yandex and Microsoft OneDrive services. Many tools are also configured to operate in server mode, waiting for the attackers to connect to infected hosts.”

“Additionally, this grouping allows data to be exfiltrated through Yandex’s cloud storage. These tools and techniques allowed APT31 to remain unnoticed within the victim’s infrastructure for years. At the same time, the attackers downloaded files and collected sensitive information from the device, including passwords for mailboxes and internal services of the victim.”

Share This Article
Twitter Copy Link
Previous Article You can now block adult websites with NordVPN. Here's how it works: You can now block adult websites with NordVPN. Here’s how it works:
Next Article US senators claim Rubio told them Trump's Ukraine peace plan is not final, but Russia's 'wish list' US senators claim Rubio told them Trump’s Ukraine peace plan is not final, but Russia’s ‘wish list’

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Malicious VSX extension 'SleepyDuck' uses Ethereum to keep command server alive
Technology

Malicious VSX extension ‘SleepyDuck’ uses Ethereum to keep command server alive

4 Min Read
Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks
Technology

Matrix Push C2 uses browser notifications for fileless, cross-platform phishing attacks

6 Min Read
ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability
Technology

ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability

3 Min Read
Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies
Technology

Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies

7 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?