CyberSecurityNews

Chinese APT Hackers Exploit Microsoft Exchange to Breach Energy Sector Network


A Chinese state-linked hacking group known as FamousSparrow has quietly infiltrated an Azerbaijani oil and gas company, exploiting an unpatched Microsoft Exchange server to plant multiple backdoors inside the network.

The attack ran from late December 2025 through late February 2026 and stands as one of the most detailed Chinese APT intrusions targeting energy infrastructure in the South Caucasus ever documented.

The threat group did not stop at one attempt. Attackers returned to the same compromised Exchange server three separate times, swapping malware families between visits and adjusting their tactics each time defenders tried to remove them.

That persistence signals a deliberate, sustained espionage campaign rather than an opportunistic breach.

Researchers at Bitdefender, who tracked the operation across all three activity waves, attributed the intrusion to FamousSparrow with moderate-to-high confidence, noting significant overlap with the Earth Estries threat cluster.

Evolution in the Deed RAT toolchain (Source – Bitdefender)

The timing is no coincidence. Azerbaijan has grown into a critical gas supplier for Europe after Russia’s Ukraine transit deal expired in 2024 and Strait of Hormuz disruptions in early 2026 reduced alternative energy sources.

Chinese APT Hackers Exploit Microsoft Exchange

The operation deployed two distinct backdoor families, Deed RAT and Terndoor, across different stages. Attackers also introduced an evolved DLL sideloading technique engineered to defeat automated security analysis, a level of sophistication rarely seen in prior campaigns tied to these malware families.

What followed was a layered operation that expanded analyst understanding of this group’s reach into energy targets.

The earliest signs of the intrusion date to December 25, 2025, when the Microsoft Exchange IIS worker process attempted to write a web shell into a publicly accessible directory on the server.

This action leveraged the ProxyNotShell exploit chain, two vulnerabilities tracked as CVE-2022-41040 and CVE-2022-41082 that allow unauthenticated remote code execution on unpatched Exchange servers.

In the days that followed, attackers dropped additional web shells with filenames such as key.aspx, log.aspx, errorFE_.aspx, and signout_.aspx. These provided a reliable foothold for issuing commands and staging further payloads.

A three-component malware chain was then deployed using files disguised as the legitimate LogMeIn Hamachi VPN application to reduce suspicion.

The loader file, LMIGuardianDll.dll, was placed alongside a genuine LogMeIn binary and sideloaded during normal startup. The Deed RAT payload was stored in an encrypted file named .hamachi.lng, decrypted in memory using AES-128 and RC4.

A Windows service mimicking LogMeIn Hamachi was also created to auto-launch the malware on every restart, locking in persistent access.

Advanced Evasion and Multi-Wave Persistence

What sets this campaign apart is the evolved DLL sideloading technique used to hide the Deed RAT loader. Unlike typical sideloading that triggers malicious code the moment a DLL is loaded, this version split its logic across two export functions named Init and ComMain.

The payload only runs after the host application follows a specific internal sequence of calls, meaning a sandbox examining the file in isolation sees no malicious behavior at all.

winMain flow of LMIGuardianSvc.exe (Source - Bitdefender)
winMain flow of LMIGuardianSvc.exe (Source – Bitdefender)

This design gates the infection behind a legitimate execution path. Security tools that inspect only portions of code find nothing to flag, and the full attack behavior is only visible when the application runs exactly as expected. That makes this sample significantly harder to detect during automated triage.

In the second wave, the group deployed a backdoor called Terndoor by hijacking the legitimate deskband_injector64.exe binary. The attempt was blocked, but forensic artifacts confirmed the malware had tried to install a kernel driver.

The third wave brought back a modified Deed RAT using sentinelonepro[.]com as its command-and-control address, impersonating a well-known security vendor to avoid detection in network logs.

Security teams should apply all available Exchange patches and rotate any exposed credentials without delay.

Monitoring should cover web shell writes through the IIS worker process, unsigned binaries patching Windows API functions in memory, and outbound HTTPS traffic to domains impersonating security vendors.

Unexpected RDP sessions using domain administrator accounts, followed quickly by PowerShell activity and new file downloads, should be treated as high-priority alerts.

Indicators of Compromise (IoCs):-

TypeIndicatorDescription
MD5 Hash0554f3b69d39d175dd110d765c11347aLMIGuardianSvc.exe — legitimate LogMeIn Hamachi binary used in Wave 1 sideloading chain
MD5 Hash762f787534a891eca8aa9b41330b4108USOShared.exe — renamed copy of deskband_injector64.exe used in Wave 2
File NameLMIGuardianDll.dllMalicious DLL loader sideloaded by LMIGuardianSvc.exe; deploys Deed RAT
File Name.hamachi.lngEncrypted Deed RAT payload, AES-128 + RC4 decrypted in memory
File Namelmiguardiandll.dllAlternate-casing malicious loader variant observed in initial Exchange exploitation stage
File Namekey.aspxWeb shell dropped via ProxyNotShell exploit on Exchange server
File Namelog.aspxWeb shell dropped via ProxyNotShell exploit on Exchange server
File NameerrorFE_.aspxWeb shell dropped via ProxyNotShell exploit on Exchange server
File Namesignout_.aspxWeb shell dropped via ProxyNotShell exploit on Exchange server
File Namewinmm.dllMalicious loader DLL used in Wave 2 Terndoor sideloading chain
File Namevmflt.sysDriver that Terndoor malware attempted to install for kernel-level persistence
File Namecache.datAssessed payload container associated with Terndoor deployment
Registry KeyHKLMSYSTEMControlSet001ServicesvmfltRegistry entries created by Terndoor to register kernel driver service
Domain (C2)virusblocker[.]it[.]com:443Command-and-control address used by Wave 1 Deed RAT variant
Domain (C2)sentinelonepro[.]com:443Command-and-control address used by Wave 3 modified Deed RAT variant
Domainipinfo[.]ioLegitimate service contacted by Wave 2 malware for network reconnaissance
CVECVE-2022-41040ProxyNotShell Exchange vulnerability exploited for initial access
CVECVE-2022-41082ProxyNotShell Exchange vulnerability exploited for initial access
Magic Value0xFF66ABCDUpdated Deed RAT module magic value (replaces 0xDEED4554 in older variants)
File PathC:RecoveryFile storage path used by Wave 3 Deed RAT components
File PathC:ProgramDataUSOSharedFile storage path used by Wave 2 Terndoor components
File PathC:TEMPLMIGuardianSvc.exeInitial staging path for Wave 1 Deed RAT loader
File PathC:Program Files (x86)LogMeIn HamachiFinal installation path mimicking legitimate LogMeIn Hamachi software

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.



Source link