Operation Cartograph: Flax Typhoon’s ArcGIS Exploitation Campaign
Persistent loaders (PlugX, Bookworm, Turian) are enabling long-term access to subscriber and core network data across the region.
The China-linked threat actors are intensifying espionage campaigns across Asia, with telecommunications providers and government networks as prime targets. These operations leverage modernised versions of PlugX, Bookworm, and Turian loaders, all sharing stealthy DLL sideloading and advanced in-memory decryption pipelines. By compromising telecoms and their service providers, adversaries gain access to subscriber data, network management systems, and interconnection gateways—delivering both intelligence and operational leverage.
Recent intelligence links a sustained espionage campaign, tracked as Flax Typhoon, to the exploitation of trusted geo-mapping platforms such as ArcGIS. The operators—Chinese-speaking and state-aligned—weaponized legitimate mapping components to gain and maintain covert, long-term access within enterprise networks. Initial compromise occurred through targeted phishing lures containing PowerShell and VBScript loaders, which retrieved a trojanized mapping “update” disguised as a legitimate patch.
Once installed, the implant persisted via scheduled tasks and registry entries, encrypting its traffic to mimic normal mapping telemetry and effectively concealing command-and-control activity. It analyzed local geo-data to understand internal topology and prioritize lateral movement while deliberately avoiding geofenced sensors and automated scans.
Given ArcGIS’s widespread use across government, utilities, and enterprise GIS environments, it is likely that some organizations have been unknowingly exploited. Notably, many of these entities rely on “advanced” security tools from leading Gartner-rated vendors. Yet this campaign highlights a growing reality: sophisticated adversaries continue to evade even well-funded, technology-centric defenses. It underscores that resilience depends not only on tooling, but on proactive threat intelligence integration and continuous validation of detection coverage.
Read more: Download the full report