Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Security

Chinese APT24 Deploys Custom Malware, New Stealthy Tactics

Cyberinchief by Cyberinchief
November 22, 2025
Reading Time: 2 mins read
0
Chinese APT24 Deploys Custom Malware, New Stealthy Tactics


Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
,
Government

RELATED POSTS

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

Warning: React2Shell vulnerability already being exploited by threat actors

3-Year Espionage Campaign Targeted Taiwanese Firms

Akshaya Asokan (asokan_akshaya) •
November 21, 2025    

Chinese APT24 Deploys Custom Malware, New Stealthy Tactics
(Image: Shutterstock)

A hacking group with links to the Chinese government is behind a three-year-long espionage campaign that targeted Taiwanese companies with a custom malware variant, researchers said.

See Also: New Trend in Federal Cybersecurity: Streamlining Efficiency with a Holistic IT Approach

Google Cloud attributed the campaign to APT24, a China-based hacking group that has been active since 2011. The latest campaign, which began in 2022, used multiple attack vectors to target Taiwanese companies using a malware variant called BADAUDIO.

“In July 2024, APT24 compromised a regional digital marketing firm in Taiwan – a supply chain attack that impacted more than 1,000 domains. Notably, the firm experienced multiple re-compromises over the last year, demonstrating APT24’s persistent commitment to the operations,” Google said.

The hacking group, also known as G0011, PITTY PANDA and Temp.Pittytiger, is largely focused on intellectual property theft relating to specific projects of strategic interest to China. The group has mainly targeted organizations in Taiwan and the United States in the healthcare, construction and engineering, mining and nonprofit sectors.

Buy JNews
ADVERTISEMENT

The hacking group deployed multiple variants of BADAUDIO, which is a first-stage downloader that collects basic system information to create persistence within victim networks. Because the hackers frequently shifted their initial access techniques, as well as combined it with malware upgrades, the hackers remained largely undetected, Google said.

For instance, the campaign initially began with the attackers relying on a watering hole technique, in which the attacker injected a malicious JavaScript payload to compromise 20 websites. The script contained the FingerprintJS library to identify victims who visited the websites, who were then shown a pop-up message that downloaded BADAUDIO malware, Google Cloud said.

Around July 2024, the attackers switched to supply chain compromises. The tactics involved hackers injecting malicious script into a widely used JavaScript library provided by a target. Using typosquatting that imitated a legitimate content delivery network, the attackers then delivered BADAUDIO.

By May of this year, the hackers switched to social engineering that used Google Drive and OneDrive to distribute encrypted archives containing BADAUDIO.

After initial access, hackers deployed the malware through search order hijacking, a tactic in which hackers ensure that Windows executes a hacker-planted, dynamic-link library file rather than a legitimate software file.

The malware then collects hostname, username and system architecture data. This information is then hashed and embedded within a cookie parameter in the command-and-control request header, which further helped the hackers to remain under the radar, Google said.

“This activity follows a broader trend GTIG has observed of PRC-nexus threat actors increasingly employing stealthy tactics to avoid detection,” Google said. Google said it took steps to disrupt the malware infrastructure disruption and it alerted customers affected by breaches.





Source link

Tags: APT24ChineseCustomDeploysmalwareStealthyTactics
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security
Cyber Security

How Russia’s Largest Private University is Linked to a $25M Essay Mill – Krebs on Security

December 8, 2025
Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data
Cyber Security

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

December 8, 2025
Warning: React2Shell vulnerability already being exploited by threat actors
Cyber Security

Warning: React2Shell vulnerability already being exploited by threat actors

December 7, 2025
News brief: RCE flaws persist as top cybersecurity threat
Cyber Security

News brief: RCE flaws persist as top cybersecurity threat

December 7, 2025
Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber Security

Barts Health NHS Confirms Cl0p Ransomware Behind Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

December 6, 2025
GOLD BLADE’s strategic evolution – Sophos News
Cyber Security

GOLD BLADE’s strategic evolution – Sophos News

December 6, 2025
Next Post
Autonomous Alert Triage & Threat Hunting in the SOC | Cybersecurity Podcast | Scaling Cyber S01E04

Autonomous Alert Triage & Threat Hunting in the SOC | Cybersecurity Podcast | Scaling Cyber S01E04

Cyber Crime Ki Duniya | DD National | Probability Full Episode | Faraz Ali

Cyber Crime Ki Duniya | DD National | Probability Full Episode | Faraz Ali

Recommended Stories

CYBER CRIME IN NEPAL? Know how to report and stay safe! #legalguff #cybercrime #onlinecomplaint

CYBER CRIME IN NEPAL? Know how to report and stay safe! #legalguff #cybercrime #onlinecomplaint

December 8, 2025
What Are Examples of TAILGATING in Cyber Security? See How to Prevent?

What Are Examples of TAILGATING in Cyber Security? See How to Prevent?

November 23, 2025
Cyber Crime Bank Account Freeze Telugu | Cyber Cell Hold | Bank Account

Cyber Crime Bank Account Freeze Telugu | Cyber Cell Hold | Bank Account

November 23, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested