Cyber Espionage Campaign Leveraging Web Server Exploits and Credential Theft Tools
Security analysts have uncovered an ongoing cyber campaign that has been targeting organizations in multiple Asian regions, particularly across South, Southeast, and East Asia. The attacks have affected entities operating in critical sectors such as aviation, energy, government services, law enforcement, pharmaceuticals, telecommunications, and technology.
Researchers have grouped this activity under a newly identified threat cluster referred to as CL-UNK-1068. Based on the behavior observed during the attacks, experts believe the operations are primarily motivated by cyber espionage, although the possibility of other objectives such as financial gain has not been completely dismissed.
Initial Compromise Through Web Servers
In many of the investigated incidents, the attackers gained their initial foothold by exploiting vulnerabilities in publicly accessible web servers. Once access was obtained, the attackers deployed web shells that allowed them to remotely interact with the compromised systems.
Among the tools used for this purpose were web shells such as Godzilla and AntSword, which enable attackers to execute commands, upload files, and maintain control over the infected servers. Additionally, a Linux-based backdoor known as Xnote was observed in some compromised environments.
To maintain long-term access and facilitate communication between compromised machines and attacker-controlled infrastructure, the threat actors also used FRP (Fast Reverse Proxy). This tool allows them to tunnel network traffic and bypass typical network restrictions.
Movement Inside the Network
After gaining access to the initial server, the attackers attempted to explore the internal network and locate systems containing valuable data. This process often involved searching for application files and configuration data stored on web servers.
A common location targeted during these searches was the wwwroot directory used by Windows-based web servers. Files frequently targeted by the attackers included configuration and application files such as .config, .aspx, .asmx, and dynamic libraries.
These files can contain sensitive information such as connection strings, credentials, or internal application logic, which can help attackers expand their access further within the organization’s infrastructure.
Data Collection and Extraction
The attackers were also observed collecting different types of files from compromised systems. These included browser activity records, spreadsheet files, CSV documents, and database backups stored on Microsoft SQL Server environments.
Instead of transferring stolen data directly over the network, the attackers sometimes used techniques designed to reduce the likelihood of detection. For instance, collected files were first compressed using WinRAR and then encoded using Base64 with the Windows utility certutil.
The encoded content could then be displayed through the web shell interface, allowing the attackers to retrieve the data manually. This approach helps avoid triggering traditional data exfiltration monitoring mechanisms.
Credential Harvesting Techniques
Another important part of the attack involved obtaining login credentials from compromised machines. To achieve this, the attackers deployed tools capable of extracting authentication data from system memory and login processes.
One of the main tools used was Mimikatz, which is widely known for its ability to recover passwords, hashes, and authentication tokens from Windows systems.
Other utilities observed in the campaign included LsaRecorder, which records credentials during authentication events, as well as memory analysis tools such as Volatility Framework and DumpItForLinux. The attackers also attempted to extract credentials stored in SQL Server Management Studio, enabling them to access databases and other systems.
Final Observations
This campaign demonstrates how threat actors combine multiple techniques to maintain stealth and persistence inside compromised networks. By exploiting web servers, installing remote access tools, collecting credentials, and using discreet methods to retrieve stolen data, attackers can remain undetected for extended periods.
The use of both legitimate system utilities and publicly available offensive tools further complicates detection efforts, highlighting the importance of continuous monitoring and strong security controls in organizations that manage critical infrastructure.
Resources


Comments
Post a Comment