Security Advisories

Operation Cartograph: Flax Typhoon’s ArcGIS Exploitation Campaign

Advisory • High Priority Operation Cartograph: Flax Typhoon’s ArcGIS Exploitation Campaign Persistent loaders (PlugX, Bookworm, Turian) are enabling long-term access to subscriber and core network data across the region. Download Full Report Subscribe for weekly briefings → The China-linked threat actors are intensifying espionage campaigns across Asia, with telecommunications providers and government networks as prime targets. These operations leverage modernised versions of PlugX, Bookworm, and Turian loaders, all sharing stealthy DLL sideloading and advanced in-memory decryption pipelines. By compromising telecoms and their service providers, adversaries gain access to subscriber data, network management systems, and interconnection gateways—delivering both intelligence and operational leverage. Recent intelligence links a sustained espionage campaign, tracked as Flax Typhoon, to the exploitation of trusted geo-mapping platforms such as ArcGIS. The operators—Chinese-speaking and state-aligned—weaponized legitimate mapping components to gain and maintain covert, long-term access within enterprise networks. Initial compromise occurred through targeted phishing lures containing PowerShell and VBScript loaders, which retrieved a trojanized mapping “update” disguised as a legitimate patch. Once installed, the implant persisted via scheduled tasks and registry entries, encrypting its traffic to mimic normal mapping telemetry and effectively concealing command-and-control activity. It analyzed local geo-data to understand internal topology and prioritize lateral movement while deliberately…
by | October 17, 2025

China-Linked Espionage Threatening Asia-Pacific Critical Communications

Advisory • High Priority China-Linked Espionage Threatening Asia-Pacific Critical Communications Persistent loaders (PlugX, Bookworm, Turian) are enabling long-term access to subscriber and core network data across the region. Download Full Report Subscribe for weekly briefings →   The China-linked threat actors are intensifying espionage campaigns across Asia, with telecommunications providers and government networks as prime targets. These operations leverage modernised versions of PlugX, Bookworm, and Turian loaders, all sharing stealthy DLL sideloading and advanced in-memory decryption pipelines. By compromising telecoms and their service providers, adversaries gain access to subscriber data, network management systems, and interconnection gateways—delivering both intelligence and operational leverage. The tradecraft—spear-phishing, stealth persistence, and credential harvesting—enables long-term footholds that are difficult to detect or eradicate. For enterprises, this represents a sustained risk of data exfiltration, service disruption, and systemic exposure across critical infrastructure. What makes this campaign particularly dangerous is the convergence of multiple malware families into a shared ecosystem of loaders and toolkits, enabling adversaries to scale operations with minimal innovation. This ecosystem approach ensures persistence across borders, sectors, and technologies—posing not just a cybersecurity risk, but a direct challenge to regional resilience and national sovereignty. Read more: Download the full report
by | October 1, 2025

Lazarus Group Expands Malware Arsenalwith New RAT Families

Lazarus Group Expands Malware Arsenal with New RAT Families The Lazarus Group, a North Korea–linked advanced persistent threat (APT), has introduced three new malware families — PondRAT, ThemeForestRAT, and RemotePE — into its operational toolkit. The emergence of these tools underscores a broader strategic shift by Lazarus: leveraging enhanced persistence, accelerated lateral movement, and a heightened focus on espionage to reinforce its operational advantage. By actively developing techniques that bypass traditional endpoint defences, the group is extending dwell time within high-value environments such as financial institutions, defence contractors, and critical infrastructure operators. This evolution demonstrates Lazarus’s capacity to outpace conventional detection models and adapt rapidly to advancing security controls. This advisory details the technical capabilities of these malware families, outlines their strategic implications, and provides actionable recommendations for security leaders to strengthen their defensive posture. Download the Full Report from our Blogs page
by | September 10, 2025