Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

China Hackers Target US Nonprofit

November 10, 2025
Reading Time: 4 mins read
in Incidents
Hackers Steal Sonicwall Cloud Backups

A hacking campaign linked to China successfully infiltrated a U.S. nonprofit organization that is active in shaping U.S. government policy on international matters. This intrusion, which occurred in April 2025, aligns with a broader pattern of Chinese state-sponsored actors showing sustained interest in U.S. entities tied to policy and geopolitical issues. According to a report by Broadcom’s Symantec, the attackers maintained unauthorized access for several weeks, indicating a clear determination to establish persistence and secure long-term access to the victim’s network.

The attack commenced on April 5, 2025, with a mass scan targeting a server using multiple well-known public exploits, including those for Log4j and Atlassian OGNL. The core offensive activity resumed on April 16, beginning with reconnaissance. The attackers used repeated curl commands to test connectivity to external sites and an internal host. Following this, they ran netstat to enumerate network connections before establishing a persistent scheduled task named \Microsoft\Windows\Ras\Outbound. This task was set to run hourly, executing msbuild.exe to likely inject code into csc.exe and establish a connection to a command-and-control (C2) server. A custom loader was also deployed at this time, executing an encrypted payload, likely a Remote Access Trojan (RAT), directly into memory.

A critical technique employed by the threat actors was DLL sideloading, leveraging a legitimate signed component of VipreAV, vetysafe.exe, to load a malicious DLL named sbamres.dll. DLL sideloading is a stealthy method that exploits the Windows DLL search order to execute malicious code using a trusted application. This specific tactic of abusing the VipreAV component is strongly linked to other China-associated actors like Space Pirates and subgroups of APT41, such as Kelp. This shared technique reinforces the attribution and suggests the use of tools, such as the Deed RAT (aka Snappy Bee), that are known to be circulated among multiple Chinese hacking groups.

In their efforts to maximize network control and remain undetected, security teams observed activity indicative of DCSync-like attacks and the use of Imjpuexc, a Microsoft file associated with East Asian input, to mask their actions. DCSync-like activity involves attempts to remotely harvest password data from domain controllers, which would grant the attackers credentials necessary to spread across a wider range of machines on the network. This focus on domain controllers further illustrates the attackers’ intent to secure a persistent and widespread presence, giving them potential access to sensitive organizational data.

All observable malicious activity ceased after April 16, 2025. This intrusion underscores the persistent espionage focus of China-linked groups, whose mission often involves monitoring and gathering intelligence on foreign governments’ attitudes and policies toward China. The attackers’ methodical actions, from initial compromise and testing to establishing long-term persistence and attempting to compromise domain controllers, make it clear their primary objective was to maintain a stealthy foothold for future intelligence-gathering operations.

Reference:

  • China Linked Hackers Target US Nonprofit In Long Term Espionage Campaign
Tags: cyber incidentsCyber Incidents 2025Cyber threatsNovember 2025
ADVERTISEMENT

Related Posts

Defender Outage Disrupts Threat Alerting

Freedom Mobile Customer Data Breach Exposed

December 4, 2025
Defender Outage Disrupts Threat Alerting

Penn Phoenix Data Breach Oracle Hack Now

December 4, 2025
Defender Outage Disrupts Threat Alerting

Defender Outage Disrupts Threat Alerting

December 4, 2025
Sorbonne Staff Data Found On Dark Web

Indian Airports Hit By Cyber Attack

December 3, 2025
Sorbonne Staff Data Found On Dark Web

ChatGPT Down Worldwide Users Affected

December 3, 2025
Sorbonne Staff Data Found On Dark Web

Sorbonne Staff Data Found On Dark Web

December 3, 2025

Latest Alerts

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Lazarus APT Remote Worker Scheme Caught

Google Fixes 107 Android Flaws In Use

Npm Package Evades AI Security Tools

Subscribe to our newsletter

    Latest Incidents

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    Indian Airports Hit By Cyber Attack

    ChatGPT Down Worldwide Users Affected

    Sorbonne Staff Data Found On Dark Web

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial