China-linked Winnti Group behind RevivalStone campaign targeting Japanese key industries

China-linked Winnti Group behind RevivalStone campaign targeting Japanese key industries

The China-linked cyber espionage group known as Winnti has been attributed to a sophisticated new campaign, dubbed RevivalStone, targeting Japanese companies across key industries, including manufacturing, materials, and energy.

The RevivalStone campaign, detailed in a report by Japanese cybersecurity company LAC, began in March 2024 and overlaps with a broader threat cluster identified by multiple cybersecurity firms. Trend Micro tracks the group as Earth Freybug, while Cybereason has labeled it as part of Operation CuckooBees, and Symantec refers to the group as Blackfly. Notably, all these variants are considered subsets of the notorious APT41, a Chinese state-sponsored cyber espionage group that has carried out operations for over a decade.

LAC’s findings provide additional insight into the group’s evolving tactics, techniques, and procedures (TTPs). APT41 is known for its ability to execute highly sophisticated espionage campaigns while also disrupting supply chains. The group is particularly skilled at leveraging stealth, using custom malware and tools designed to bypass security defenses, extract sensitive data, and maintain long-term covert access to victim environments.

Recent attacks, spanning from November 2023 to October 2024, leveraged vulnerabilities in public-facing applications like IBM Lotus Domino to deliver various types of malware, including Deathlotus (a passive CGI backdoor supporting file creation and command execution);

Unapimon (a defense evasion utility); Privatelog (a loader used to deploy the Winnti Remote Access Trojan (RAT), also known as Deploylog, which installs a kernel-level rootkit named WINNKIT); Cunningpigeon (a backdoor using Microsoft Graph API for command and control); Windjammer (a rootkit for intercepting network traffic and creating covert communication channels); Shadowgaze (a passive backdoor reusing IIS web server ports for stealthy communications).

The RevivalStone attack chain began with an SQL injection vulnerability in an enterprise resource planning (ERP) system, which allowed the attackers to drop web shells, such as China Chopper and Behinder (also known as Bingxia and IceScorpion), onto the compromised server. These tools were used for reconnaissance, credential collection, lateral movement, and the delivery of an enhanced version of the Winnti malware.

The attackers further expanded their reach by exploiting a managed service provider (MSP) through a shared account, enabling them to propagate the malware to three additional organizations.

Researchers at LAC also discovered references to TreadStone and StoneV5 in the malware associated with the RevivalStone campaign. TreadStone is thought to be a controller designed to work with the Winnti malware. The group’s latest malware appears to be a version upgrade, possibly Winnti v5.0, incorporating advanced features such as enhanced obfuscation, updated encryption algorithms, and improved evasion techniques to bypass modern security defenses.


Back to the list

Latest Posts

Researchers caught embedding hidden AI prompts to sway research reviewers

Researchers caught embedding hidden AI prompts to sway research reviewers

The investigation analyzed English-language preprints published on the research platform arXiv and found concealed AI instructions in 17 papers.
7 July 2025
Brazilian programmer arrested for role in $185 million bank hack

Brazilian programmer arrested for role in $185 million bank hack

João Nazareno Roque, a junior back-end developer at C&M, was allegedly recruited by hackers in a bar in São Paulo.
7 July 2025
APT36 cyber-espionage campaign targeting Indian defense sector via BOSS Linux

APT36 cyber-espionage campaign targeting Indian defense sector via BOSS Linux

More recently, APT36 has shifted its focus to Linux-based environments.
7 July 2025