From phishing to Google Drive C2: Silver Dragon expands APT41 playbook
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读这篇文章,理解它的主要内容。 文章讲的是一个叫做Silver Dragon的APT组织,和APT41有关联,他们主要攻击欧洲和东南亚的政府机构。攻击手段包括利用服务器漏洞和钓鱼邮件,使用恶意附件来获取初始访问权限。然后他们通过劫持合法的Windows服务来维持持久性,并且使用Cobalt Strike和Google Drive作为命令控制中心来逃避检测。 攻击链涉及AppDomain劫持、恶意服务DLL部署和武器化的LNK附件。他们还使用高度混淆的加载器,比如MonikerLoader和BamboLoader,来解密和注入有效载荷到内存中。此外,他们还利用自动化框架生成定制的攻击包,并且部署了多种后渗透工具,如SilverScreen、SSHcmd和GearDoor。 最后,文章提到这个组织主要针对高知名度的政府机构,并且不断更新他们的工具和技术,显示出很强的适应性和资源。 好的,现在我需要把这些信息浓缩到100字以内。要抓住关键点:Silver Dragon与APT41关联,目标是政府机构,利用服务器漏洞、钓鱼邮件、恶意附件进行攻击,使用Cobalt Strike和Google Drive作为C2,并且有自动化框架生成攻击包。 所以总结应该是:Silver Dragon与APT41关联,针对欧洲和东南亚政府机构展开网络攻击。利用服务器漏洞、钓鱼邮件及恶意附件获取初始访问权限,并通过Cobalt Strike与Google Drive实现C2通信。采用自动化框架生成定制攻击包。 </think> Silver Dragon与APT41关联,针对欧洲和东南亚政府机构展开网络攻击。利用服务器漏洞、钓鱼邮件及恶意附件获取初始访问权限,并通过Cobalt Strike与Google Drive实现C2通信。采用自动化框架生成定制攻击包。 2026-3-4 11:51:24 Author: securityaffairs.com(查看原文) 阅读量:9 收藏

From phishing to Google Drive C2: Silver Dragon expands APT41 playbook

APT group Silver Dragon, linked to APT41, targets governments via server exploits and phishing, using Cobalt Strike and Google Drive for C2.

Check Point researchers have identified Silver Dragon, an APT group tied to the China-linked group APT41, targeting government entities in Europe and Southeast Asia since mid-2024. The group gains initial access by exploiting public-facing servers and sending phishing emails with malicious attachments. It maintains persistence by hijacking legitimate Windows services and uses tools like Cobalt Strike and Google Drive-based command-and-control to evade detection.

The attack chain rely on AppDomain hijacking, malicious service DLL deployment, and weaponized LNK attachments.

The group leverages heavily obfuscated loaders such as MonikerLoader and BamboLoader to decrypt and inject payloads in memory, hijack legitimate Windows services for persistence, and evade detection.

Evidence suggests the use of an automated framework to generate tailored attack packages.

“All files contained within the initial archive shared an identical creation timestamp, which strongly suggests the use of an automated payload generation framework.” reads the report published by Check Point. “Supporting this assumption, we recovered a log file from one archive that appears to document per-attack configuration parameters, including file paths, service names, encryption keys, and injected processes.”

Both MonikerLoader and BamboLoader ultimately deploy Cobalt Strike beacons as the final payload, using cracked versions configured for DNS tunneling, HTTP via Cloudflare, or even SMB communication within compromised networks.

Beyond Cobalt Strike, Silver Dragon relies on custom post-exploitation tools. SilverScreen covertly captures screenshots, compresses them, and stores them for later exfiltration. SSHcmd enables remote command execution and file transfer over SSH. GearDoor, a .NET backdoor, uses Google Drive as a command-and-control channel, encrypting communications and managing tasks through specially crafted file extensions.

Together, these tools provide persistence, stealthy data exfiltration, lateral movement, plugin execution, and even self-updating capabilities, highlighting an advanced and modular intrusion framework.

Silver Dragon mainly targets high-profile government organizations, focusing largely on Southeast Asia, with additional activity observed in parts of Europe.

“Throughout our analysis, we observed that the group continuously evolves its tooling and techniques, actively testing and deploying new capabilities across different campaigns.” concludes the report. “The use of diverse vulnerability exploits, custom loaders, and sophisticated file-based C2 communication reflects a well-resourced and adaptable threat group.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, APT41)




文章来源: https://securityaffairs.com/188895/apt/from-phishing-to-google-drive-c2-silver-dragon-expands-apt41-playbook.html
如有侵权请联系:admin#unsafe.sh