PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats

Aug. 26, 2025, 8:13 a.m.

Description

A sophisticated cyber espionage campaign attributed to the PRC-nexus threat actor UNC6384 targeted diplomats in Southeast Asia and other global entities. The attack chain involved hijacking web traffic through a captive portal redirect to deliver malware disguised as software updates. The multi-stage attack utilized advanced social engineering, adversary-in-the-middle techniques, and evasion tactics. The malware payload, SOGU.SEC backdoor, was deployed through a digitally signed downloader (STATICPLUGIN) and a side-loaded DLL (CANONSTAGER). The campaign demonstrated the evolving capabilities of PRC-nexus threat actors, employing stealthy tactics to avoid detection and leveraging legitimate Windows features for malicious purposes.

Date

  • Created: Aug. 26, 2025, 12:06 a.m.
  • Published: Aug. 26, 2025, 12:06 a.m.
  • Modified: Aug. 26, 2025, 8:13 a.m.

Indicators

  • e787f64af048b9cb8a153a0759555785c8fd3ee1e8efbca312a29f2acb1e4011
  • d1626c35ff69e7e5bde5eea9f9a242713421e59197f4b6d77b914ed46976b933
  • cc4db3d8049043fa62326d0b3341960f9a0cf9b54c2fbbdffdbd8761d99add79
  • 65c42a7ea18162a92ee982eded91653a5358a7129c7672715ce8ddb6027ec124
  • 4ed76fa68ef9e1a7705a849d47b3d9dcdf969e332bd5bcb68138579c288a16d3
  • 3299866538aff40ca85276f87dd0cefe4eafe167bd64732d67b06af4f3349916
  • 166.88.2.90
  • 103.79.120.72
  • mediareleaseupdates.com

Attack Patterns

Additional Informations

  • Government