Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence

Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence

The China-backed advanced persistent threat group Flax Typhoon maintained year-long access to an ArcGIS system by turning trusted software into a persistent backdoor—an attack so unique it prompted the vendor to update its documentation.

The attackers repurposed a legitimate Java server object extension into a web shell, gated access with a hardcoded key, and embedded it in backups to evade detection.

While ArcGIS was targeted for access to interconnected systems, any public-facing application with backend access is at risk. Organizations must move beyond indicator-of-compromise-based detection and treat public-facing applications as high-risk assets.

For over a year, Flax Typhoon demonstrated that attackers don’t need their own tools when they can weaponize yours.

The group modified a geo-mapping application’s Java server object extension into a functioning web shell, achieving persistence that could survive full system recovery.

By gating access with a hardcoded key and embedding the component in system backups, their foothold would persist after remediation.

This backdoor enabled hands-on-keyboard activity, facilitating command execution, lateral movement, and credential harvesting across multiple hosts.

The attack exploited the inherent trust placed in legitimate software components. Instead of deploying known malicious tools, attackers repurposed a legitimate server object extension into a covert web shell, allowing movements to appear as normal operations and bypass detection tools focused on known-bad artifacts.

Repeatedly abused this same web shell to run additional encoded PowerShell commands; all routed through the same “JavaSimpleRESTSOE” extension and “getLayerCountByType” operation.

GET request instructing the server to create a new directory.
GET request instructing the server to create a new directory.

By adding a hardcoded key, Flax Typhoon prevented others from tampering with access, forcing a shift in security thinking from whether a file is malicious to whether an application is behaving as expected.

The persistence method was particularly insidious. By ensuring the compromised component was included in backups, they turned recovery plans into guaranteed reinfection methods.

This transforms safety nets into liabilities, meaning incident response teams must treat backups as potential reinfection vectors.

ArcGIS: A Gateway to Critical Infrastructure

ArcGIS is a geographic information system used to visualize, analyze, and manage spatial data for critical functions like disaster recovery, urban planning, and emergency management.

Working with ArcGIS, we found the attackers compromised a portal administrator account and deployed a malicious SOE.

Malicious SOE decompiled.Malicious SOE decompiled.
Malicious SOE decompiled.

A single compromise can disrupt operations, expose sensitive infrastructure data, and provide gateways for lateral movement into interconnected enterprise and operational technology networks.

Although specialized applications like ArcGIS may escape heavy scrutiny, the weakness exploited exists in any public-facing application organizations consider safe.

Secure products can be vulnerable if operating environments lack equal rigor. Vendor guidance should be treated as baselines, not comprehensive strategies. Organizations must harden applications assuming any feature can become a vulnerability.

Flax Typhoon’s Signature Tactics

Security researchers addressed this attack with high confidence to Chinese APTs and moderate confidence to Flax Typhoon, also known as Ethereal Panda.

The group uses SoftEther VPN to create VPN bridges and maintains persistent access often exceeding twelve months.

Malicious renamed bridge.exe ingressed.Malicious renamed bridge.exe ingressed.
Malicious renamed bridge.exe ingressed.

Flax Typhoon prioritizes persistence, lateral movement, and credential harvesting, typically gaining initial access by exploiting public-facing servers, deploying web shells, and establishing VPN connections. Activity aligns with Chinese business hours while attack sectors match previous patterns.

Active since at least 2021, Flax Typhoon conducts long dormancy periods for planning before executing precise attacks. The group consistently focuses on critical infrastructure, making this attribution significant.

Organizations must move beyond prevention and actively hunt for compromise signs, as experts assess Flax Typhoon is likely active in new networks or planning its next victim.

This attack underscores the need to question assumptions about trusted applications and implement behavioral monitoring detecting when legitimate tools are abused.

IOCs

Artifact Details
172.86.117[.]230 C2 IP (SoftEther VPN Server)
bridge.exe Renamed SoftEther VPN Bridge
vpn_bridge.config SoftEther VPN Config File
hamcore.se2 SoftEther Installation File
4f9d9a6cba88832fcb7cfb845472b63ff15cb9b417f4f02cb8086552c19ceffc File hash of bridge.exe
8282c5a177790422769b58b60704957286edb63a53a49a8f95cfa1accf53c861 File hash of vpn_bridge.config
84959fe39d655a9426b58b4d8c5ec1e038af932461ca85916d7adeed299de1b3 File hash of hamcore.se2
cec625f70d2816c85b1c6b3b449e4a84a5da432b75a99e9efa9acd6b9870b336 File hash of simplerestsoe.soe

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.