Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

China Hackers Target US Nonprofit

November 10, 2025
Reading Time: 4 mins read
in Incidents
Hackers Steal Sonicwall Cloud Backups

A hacking campaign linked to China successfully infiltrated a U.S. nonprofit organization that is active in shaping U.S. government policy on international matters. This intrusion, which occurred in April 2025, aligns with a broader pattern of Chinese state-sponsored actors showing sustained interest in U.S. entities tied to policy and geopolitical issues. According to a report by Broadcom’s Symantec, the attackers maintained unauthorized access for several weeks, indicating a clear determination to establish persistence and secure long-term access to the victim’s network.

The attack commenced on April 5, 2025, with a mass scan targeting a server using multiple well-known public exploits, including those for Log4j and Atlassian OGNL. The core offensive activity resumed on April 16, beginning with reconnaissance. The attackers used repeated curl commands to test connectivity to external sites and an internal host. Following this, they ran netstat to enumerate network connections before establishing a persistent scheduled task named \Microsoft\Windows\Ras\Outbound. This task was set to run hourly, executing msbuild.exe to likely inject code into csc.exe and establish a connection to a command-and-control (C2) server. A custom loader was also deployed at this time, executing an encrypted payload, likely a Remote Access Trojan (RAT), directly into memory.

A critical technique employed by the threat actors was DLL sideloading, leveraging a legitimate signed component of VipreAV, vetysafe.exe, to load a malicious DLL named sbamres.dll. DLL sideloading is a stealthy method that exploits the Windows DLL search order to execute malicious code using a trusted application. This specific tactic of abusing the VipreAV component is strongly linked to other China-associated actors like Space Pirates and subgroups of APT41, such as Kelp. This shared technique reinforces the attribution and suggests the use of tools, such as the Deed RAT (aka Snappy Bee), that are known to be circulated among multiple Chinese hacking groups.

In their efforts to maximize network control and remain undetected, security teams observed activity indicative of DCSync-like attacks and the use of Imjpuexc, a Microsoft file associated with East Asian input, to mask their actions. DCSync-like activity involves attempts to remotely harvest password data from domain controllers, which would grant the attackers credentials necessary to spread across a wider range of machines on the network. This focus on domain controllers further illustrates the attackers’ intent to secure a persistent and widespread presence, giving them potential access to sensitive organizational data.

All observable malicious activity ceased after April 16, 2025. This intrusion underscores the persistent espionage focus of China-linked groups, whose mission often involves monitoring and gathering intelligence on foreign governments’ attitudes and policies toward China. The attackers’ methodical actions, from initial compromise and testing to establishing long-term persistence and attempting to compromise domain controllers, make it clear their primary objective was to maintain a stealthy foothold for future intelligence-gathering operations.

Reference:

  • China Linked Hackers Target US Nonprofit In Long Term Espionage Campaign
Tags: cyber incidentsCyber Incidents 2025Cyber threatsNovember 2025
ADVERTISEMENT

Related Posts

Hackers Steal Sonicwall Cloud Backups

Oracle EBS Hack Hits Nearly 30 Victims

November 10, 2025
Hackers Steal Sonicwall Cloud Backups

Hackers Steal Sonicwall Cloud Backups

November 10, 2025
US Budget Office Hit By Cyberattack

US Budget Office Hit By Cyberattack

November 7, 2025
US Budget Office Hit By Cyberattack

Hyundai AutoEver Reports Data Breach

November 7, 2025
US Budget Office Hit By Cyberattack

Clop Claims Washington Post Breach

November 7, 2025
Belgian Telecoms Hit By Cyberattack

Hackers Steal Data From Swiss Bank

November 6, 2025

Latest Alerts

Samsung Flaw Used To Install Landfall

ClickFix Phishing Targets Hotel Systems

Lost iPhone Beware Fake Text Claims

Malicious VS Code Extension Found

CISA Warns Of CentOS Panel Exploit

Gootloader Returns With New Tricks

Subscribe to our newsletter

    Latest Incidents

    Oracle EBS Hack Hits Nearly 30 Victims

    China Hackers Target US Nonprofit

    Hackers Steal Sonicwall Cloud Backups

    US Budget Office Hit By Cyberattack

    Hyundai AutoEver Reports Data Breach

    Clop Claims Washington Post Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial