{"id":150,"date":"2026-03-04T09:30:04","date_gmt":"2026-03-04T09:30:04","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=150"},"modified":"2026-03-04T09:30:04","modified_gmt":"2026-03-04T09:30:04","slug":"apt41-linked-silver-dragon-targets-governments-using-cobalt-strike-and-google-drive-c2","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=150","title":{"rendered":"APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Mar 04, 2026<\/span><\/span><span class=\"p-tags\">Malware \/ Windows Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGPaqQJe-7ak-qgx29_h6G7zUiJhGiBSHZEiydrRzZzuKVlVMBzrJNLFndAvmu15EzX2SXQ8NUHKyH9ZJDQRQMnXukmrUfdPor35gswSxUuTNGGXo7h8eOhDNBVAaCGEo_ohNYv2-8W-zpOuSSHYqCB5iURwesotjNTK9a3926UdkuqI2uz-zUBMzNP5cU\/s1700-e365\/dragon.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed <strong>Silver Dragon<\/strong> that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024.<\/p>\n<p>\u00abSilver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments,\u00bb Check Point <a href=\"https:\/\/research.checkpoint.com\/2026\/silver-dragon-targets-organizations-in-southeast-asia-and-europe\/\" rel=\"noopener\" target=\"_blank\">said<\/a> in a technical report. \u00abTo maintain persistence, the group hijacks legitimate Windows services, which allows the malware processes to blend into normal system activity.\u00bb<\/p>\n<p>Silver Dragon is assessed to be operating within the APT41 umbrella. APT41 is the cryptonym assigned to a prolific Chinese hacking group known for its targeting of healthcare, telecoms, high-tech, education, travel services, and media sectors for cyber espionage as early as 2012. It&#8217;s also believed to engage in financially motivated activity potentially outside of state control.<\/p>\n<p>Attacks mounted by Silver Dragon have been found to primarily single out government entities, with the adversary using Cobalt Strike beacons for persistence on compromised hosts. It&#8217;s also known to employ techniques like DNS tunneling for command-and-control (C2) communication to bypass detection.<\/p>\n<p>Check Point said it identified three different infection chains to deliver Cobalt Strike: <a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/014\/\" rel=\"noopener\" target=\"_blank\">AppDomain hijacking<\/a>, service DLL, and email-based phishing.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/not-fast-enough-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhlXM830ruQd2xT6M7JNeNRjaFa1onD12WjSCHihTFMTzbyfT9h-irPmXy_h3E1HGSs6sdv7FTmnyNVTM5kmSb7BuUtZe8gKoTQt99P1sSzRcqqXpOJP6eoAOhR3DGb6qHx9kOZ_HBZUMmVnsnd0DM7QfUp81bgzTvvgLww6oqB-EhnDfWXH5pWCYhAsyLs\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abThe first two infection chains, AppDomain hijacking and Service DLL, show clear operational overlap,\u00bb the cybersecurity company said. \u00abThey are both delivered via compressed archives, suggesting their use in post\u2011exploitation scenarios. In several cases, these chains were deployed following the compromise of publicly exposed vulnerable servers.\u00bb<\/p>\n<p>The two chains make use of a RAR archive containing a batch script, with the first chain using it to drop MonikerLoader, a NET-based loader responsible for decrypting and executing a second-stage directly in memory. The second stage, for its part, mimics MonikerLoader&#8217;s behavior, acting as a conduit for loading the final Cobalt Strike beacon payload.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>On the other hand, the service DLL chain uses a batch script to deliver a shellcode DLL loader dubbed BamboLoader, which is registered as a Windows service. A heavily obfuscated C++ malware, it&#8217;s used to decrypt and decompress shellcode staged on disk, and inject it into a legitimate Windows process, such as \u00abtaskhost.exe.\u00bb The binary targeted for injection is configurable within BamboLoader.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPleTdpYzAN-hRx0ZQDAutOQ8NHCiTk-IGca5jGqaztyxqrArnvgmOhypgWJpvWbPPAbTOGyLe5yWXHEJXhKnCz83KXuRXrd_3yWt70Q-ZUemrenbKs42eM4n5OMsDEevSVM9LV3sfgrR9MIaHCq-u7UFwYWTcemgGEZUyuQfeDE15dcuLYqh41nXDfFWp\/s1700-e365\/cp.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPleTdpYzAN-hRx0ZQDAutOQ8NHCiTk-IGca5jGqaztyxqrArnvgmOhypgWJpvWbPPAbTOGyLe5yWXHEJXhKnCz83KXuRXrd_3yWt70Q-ZUemrenbKs42eM4n5OMsDEevSVM9LV3sfgrR9MIaHCq-u7UFwYWTcemgGEZUyuQfeDE15dcuLYqh41nXDfFWp\/s1700-e365\/cp.png\" alt=\"\" border=\"0\" data-original-height=\"1734\" data-original-width=\"3756\"\/><\/a><\/div>\n<p>The third infection chain involves a phishing campaign that has primarily targeted Uzbekistan with malicious Windows shortcuts (LNK) as attachments. The weaponized LNK file is designed to launch PowerShell code by means of \u00abcmd.exe,\u00bb leading to the extraction and execution of next-stage payloads. This includes four different files &#8211;<\/p>\n<ul>\n<li>Decoy document<\/li>\n<li>Legitimate executable vulnerable to DLL side-loading (\u00abGameHook.exe\u00bb)<\/li>\n<li>Malicious DLL aka BamboLoader (\u00abgraphics-hook-filter64.dll\u00bb)<\/li>\n<li>Encrypted Cobalt Strike payload (\u00absimhei.dat\u00bb)<\/li>\n<\/ul>\n<p>As part of this campaign, the decoy document is displayed to the victim, while, in the background, the rogue DLL is sideloaded via \u00abGameHook.exe\u00bb to ultimately launch Cobalt Strike. The attacks are also characterized by the deployment of various post-exploitation tools &#8211;<\/p>\n<ul>\n<li><strong>SilverScreen<\/strong>, a .NET screen-monitoring tool used to capture periodic screenshots of user activity, including precise cursor positioning.<\/li>\n<li><strong>SSHcmd<\/strong>, a .NET command-line SSH utility that provides remote command execution and file transfer capabilities over SSH.<\/li>\n<li><strong>GearDoor<\/strong>, a NET backdoor that shares similarities with MonikerLoader and communicates with its C2 infrastructure via Google Drive.<\/li>\n<\/ul>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/xm-cyber-comm-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjeddeABvLw_c_ToOCMJPgQbMsApaTV3NUf6HM6UvXJMdWuMwDjqX3SsAJ3AFa2tLmqtvPxYwtaaAxhEbjMflJYYBOEtruJgSbLmu5axVBfkb-epbRoJmYPS79p3QMYea_Z3OfeaKYa4ocXewrWsdMRRSUW7UE5dNMGns2eNUwSelaseMB4sblfZnEgxWTH\/s728-e100\/risk-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Once executed, the backdoor authenticates to the attacker-controlled Google Drive account and uploads a heartbeat file containing basic system information. Interestingly, the backdoor utilizes different file extensions to indicate the nature of the task to be performed on the infected host. The results of the task execution are captured and uploaded to Drive.<\/p>\n<ul>\n<li><strong>*.png<\/strong>, to send heartbeat files.<\/li>\n<li><strong>*.pdf<\/strong>, to receive and execute commands, list the contents of a directory, make a new directory, and remove all files within a specified directory. The results of the operation are sent to the server in the form of a *.db file.<\/li>\n<li><strong>*.cab<\/strong>, to receive and execute commands to gather host information and a list of running processes, enumerate files and directories, run commands via \u00abcmd.exe\u00bb or scheduled tasks, upload files to Google Drive, and terminate the implant. The execution status is uploaded as a .bak file.<\/li>\n<li><strong>*.rar<\/strong>, to receive and execute payloads. If the RAR file is named \u00abwiatrace.bak,\u00bb the backdoor treats it as a self-update package. The results are uploaded as .bak files.<\/li>\n<li><strong>*.7z<\/strong>, to receive and execute plugins in memory. The results are uploaded as .bak files.<\/li>\n<\/ul>\n<p>Silver Dragon&#8217;s links to APT41 stem from tradecraft overlaps with post-exploitation installation scripts previously <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/apt41-initiates-global-intrusion-campaign-using-multiple-exploits\/\" rel=\"noopener\" target=\"_blank\">attributed to the latter<\/a> and the fact that the decryption mechanism used by BamboLoader has been observed in shellcode loaders linked to China-nexus APT activity.<\/p>\n<p>\u00abThe group continuously evolves its tooling and techniques, actively testing and deploying new capabilities across different campaigns,\u00bb Check Point said. \u00abThe use of diverse vulnerability exploits, custom loaders, and sophisticated file-based C2 communication reflects a well-resourced and adaptable threat group.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Mar 04, 2026Malware \/ Windows Security Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting&hellip;<\/p>\n","protected":false},"author":1,"featured_media":151,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[413,416,415,418,2,378,414,417,78],"class_list":["post-150","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-apt41linked","tag-cobalt","tag-dragon","tag-drive","tag-google","tag-governments","tag-silver","tag-strike","tag-targets"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=150"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/150\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/151"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}