A sophisticated China-linked cyber espionage campaign called “LapDogs” has now emerged targeting over 1,000 SOHO devices. This covert infrastructure operation, active since at least September 2023, represents a significant evolution in nation-state tactics. Unlike traditional botnets that launch noisy attacks, this network operates with surgical precision to maintain complete stealth.
SecurityScorecard analysts successfully identified this previously unreported threat through extensive and very detailed forensic analysis of the campaign. The researchers discovered clear evidence of deliberate campaign growth, with attackers launching well-planned intrusion waves targeting specific regions. These distinct operational patterns strongly suggest highly focused and very goal-oriented attackers are responsible for these illegal actions. Forensic evidence, including Mandarin coder notes, led analysts to assess the infrastructure is utilized by APT group UAT-5918.
The campaign demonstrates remarkable geographical precision, with its targets highly concentrated in the United States and Southeast Asia.
The LapDogs campaign’s technical sophistication centers around a custom backdoor malware which has been given the name “ShortLeash.” This specific backdoor was designed for establishing persistent footholds on the many different compromised SOHO router devices. The malware employs a particularly clever obfuscation technique by generating its own unique self-signed TLS security certificates. These certificates present as “LAPD,” appearing to reference the Los Angeles Police Department for a plausible operational cover.
The backdoor’s certificate generation patterns revealed over one thousand actively infected network nodes that are spread out globally.
The clever design of the backdoor prioritizes stealth over speed, which enables the threat actors to maintain long-term access. It helps them avoid the traditional detection mechanisms that focus on identifying noisy or very obvious malware behaviors. This stealthy approach makes both detection and attribution of the attacks exceptionally challenging for cybersecurity professionals to perform.
Reference: