NightEagle APT Unleashes Custom Malware and Zero-Days to Infiltrate Industrial Systems

NightEagle APT Unleashes Custom Malware and Zero-Days to Infiltrate Industrial Systems

The advanced attack campaigns of a top Advanced Persistent Threat (APT) group known as “NightEagle,” internally coded as APT-Q-95, were revealed by top cybersecurity company Qian Pangu in a ground-breaking revelation at the 2025 Malaysia National Cyber Defense and Security Exhibition and Conference.

A Stealthy Predator in the Cyber Realm

Since 2023, Qian Pangu has meticulously tracked this group, which has demonstrated unparalleled agility in exploiting unknown vulnerabilities and deploying custom malware to target high-value industries in China

Modifying the source code

It includes high-tech, chip semiconductors, quantum technology, artificial intelligence, and military sectors.

NightEagle’s primary objective appears to be intelligence theft, executed with surgical precision before erasing all traces of infiltration.

NightEagle’s modus operandi is characterized by its rapid infrastructure switching, leveraging vast financial resources to acquire numerous VPS servers and domain names often using a unique domain per target with dynamic IP resolutions to evade detection.

Qian Pangu first detected suspicious activity through their Qianxin Tianyan NDR system, identifying an anomalous DNS request to “synologyupdates.com,” a domain masquerading as Synology’s NAS service but resolving to local IPs like 127.0.0.1 to obscure real server locations.

Exploiting Shadows with Advanced Tactics

Further analysis via Qianxin AISOC revealed a customized Go-language malware, “SynologyUpdate.exe,” from the Chisel family, facilitating internal network penetration via a hardcoded SOCKS connection over port 443.

This malware, triggered every four hours by scheduled tasks, paved the way for deeper breaches.

The group’s arsenal includes a unique memory-resident malware, a “memory horse,” injected into Exchange servers without disk footprints, rendering it invisible to traditional antivirus tools.

This payload, loaded via an ASP.NET DLL named “App_Web_cn*.dll,” creates virtual URL directories under paths like “/owa/auth/” to execute malicious functions.

NightEagle also wields an undisclosed Exchange zero-day exploit chain, enabling attackers to steal server keys, deserialize data, and remotely harvest emails from targeted individuals by iterating through various Exchange versions until a match is found.

Traffic analysis by Qianxin’s Tianyan NDR showed that critical email data had been siphoned for nearly a year from affected entities.

Behavioral patterns suggest NightEagle operates strictly between 9 p.m. and 6 a.m. Beijing time, likely originating from North America’s Western 8th Time Zone.

Their targets align with geopolitical shifts and China’s burgeoning AI industry, as seen with domains like “comfyupdate.org” linked to AI tools.

Qian Pangu’s threat intelligence has identified several malicious domains and specific attack signatures, urging global organizations to inspect Exchange servers for suspicious IIS components and URL requests.

Tools like Qianxin’s APT-Q-95 Exchange Memory Self-Check and Tianqing Terminal Management System are now available to detect and mitigate these threats, supported by multi-source data fusion across NDR, EDR, and AISOC platforms for automated response within minutes.

Indicators of Compromise (IOCs)

Domain Name Associated Activity
app.flowgw.com Malware C2 Communication
cloud.synologyupdates.com Disguised DNS Resolution
comfyupdate.org AI Tool impersonation
coremailtech.com Email Service Targeting
dashboard.daihou360.com Custom Malware Distribution
e-mailrelay.com Email Data Exfiltration
fastapi-cdn.com Malware Hosting
fortisys.net C2 Infrastructure

Exclusive Webinar Alert: Harnessing Intel® Processor Innovations for Advanced API Security – Register for Free


Source link