Southeast Asian govt’s targeted in espionage campaign aiming to steal trade secrets

Southeast Asian govt’s targeted in espionage campaign aiming to steal trade secrets

Cybersecurity researchers at Palo Alto Network’s Unit 42 have uncovered a highly targeted cyber espionage campaign, tracked as CL-STA-1020, aimed at government entities across Southeast Asia. The campaign, active since late 2024, appears focused on covert intelligence gathering, with particular interest in sensitive documents related to tariffs and trade disputes.

The campaign involves a new Windows backdoor, dubbed ‘HazyBeacon’, that utilizes AWS Lambda URLs for command and control (C2) communication. By leveraging legitimate cloud services like AWS, Google Drive, and Dropbox, the attackers have effectively cloaked their operations within normal network traffic.

The HazyBeacon backdoor was deployed via DLL sideloading, with a malicious DLL file being placed alongside a legitimate Windows executable mscorsvw.exe. When executed, it loaded the malicious DLL and initiated communication with a Lambda URL controlled by the attackers. To ensure persistence, the threat actor registered a Windows service named msdnetsvc, allowing HazyBeacon to survive system reboots.

The attackers attempted to exfiltrate stolen data through Google Drive and Dropbox using tools such as GoogleGet.exe, although those efforts were reportedly unsuccessful. Before abandoning the compromised systems, they issued cleanup commands to delete payloads, temporary archives, and logs in an effort to erase their digital footprints.


Back to the list

Latest Posts

Google patches Chrome zero-day allowing sandbox escape

Google patches Chrome zero-day allowing sandbox escape

The flaw stems from insufficient validation of untrusted input in ANGLE and GPU.
16 July 2025
Ukrainian police dismantle major server network used for malware distribution

Ukrainian police dismantle major server network used for malware distribution

Authorities identified a 33-year-old French national as the organizer of the illegal operation.
16 July 2025
Russian NoName057(16) hacktivist group behind cyberattacks on European infrastructure dismantled

Russian NoName057(16) hacktivist group behind cyberattacks on European infrastructure dismantled

The operation resulted in seven international arrest warrants, including for two alleged ringleaders residing in Russia.
16 July 2025