Article Details

Scrape Timestamp (UTC): 2025-11-22 15:19:52.334

Source: https://thehackernews.com/2025/11/china-linked-apt31-launches-stealthy.html

Original Article Text

Click to Toggle View

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services. The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information technology (IT) sector between 2024 and 2025 while staying undetected for extended periods of time. "In the period from 2024 to 2025, the Russian IT sector, especially companies working as contractors and integrators of solutions for government agencies, faced a series of targeted computer attacks," Positive Technologies researchers Daniil Grigoryan and Varvara Koloskova said in a technical report. APT31, also known as Altaire, Bronze Vinewood, Judgement Panda, PerplexedGoblin, RedBravo, Red Keres, and Violet Typhoon (formerly Zirconium), is assessed to be active since at least 2010. It has a track record of striking a wide range of sectors, including governments, financial, and aerospace and defense, high tech, construction and engineering, telecommunications, media, and insurance. The cyber espionage group is primarily focused on gathering intelligence that can provide Beijing and state-owned enterprises with political, economic, and military advantages. In May 2025, the hacking crew was blamed by the Czech Republic for targeting its Ministry of Foreign Affairs. The attacks aimed at Russia are characterized by the use of legitimate cloud services, mainly those prevalent in the country, like Yandex Cloud, for command-and-control (C2) and data exfiltration in an attempt to blend in with normal traffic and escape detection. The adversary is also said to have staged encrypted commands and payloads in social media profiles, both domestic and foreign, while also conducting their attacks during weekends and holidays. In at least one attack targeting an IT company, APT31 breached its network as far back as late 2022, before escalating the activity coinciding with the 2023 New Year holidays. In another intrusion detected in December 2024, the threat actors sent a spear-phishing email containing a RAR archive that, in turn, included a Windows Shortcut (LNK) responsible for launching a Cobalt Strike loader dubbed CloudyLoader via DLL side-loading. Details of this activity were previously documented by Kaspersky in July 2025, while identifying some overlaps with a threat cluster known as EastWind. The Russian cybersecurity company also said it identified a ZIP archive lure that masqueraded as a report from the Ministry of Foreign Affairs of Peru to ultimately deploy CloudyLoader. To facilitate subsequent stages of the attack cycle, APT31 has leveraged an extensive set of publicly available and custom tools. Persistence is achieved by setting up scheduled tasks that mimic legitimate applications, such as Yandex Disk and Google Chrome. Some of them are listed below - "APT31 is constantly replenishing its arsenal: although they continue to use some of their old tools," Positive Technologies said. "As C2, attackers actively use cloud services, in particular, Yandex and Microsoft OneDrive services. Many tools are also configured to work in server mode, waiting for attackers to connect to an infected host." "In addition, the grouping exfiltrates data through Yandex's cloud storage. These tools and techniques allowed APT31 to stay unnoticed in the infrastructure of victims for years. At the same time, attackers downloaded files and collected confidential information from devices, including passwords from mailboxes and internal services of victims."

Daily Brief Summary

NATION STATE ACTIVITY // APT31 Targets Russian IT Sector Using Cloud Services for Stealth

APT31, a China-linked cyber espionage group, targeted the Russian IT sector, focusing on contractors for government agencies, from 2024 to 2025.

The group utilized legitimate cloud services like Yandex Cloud for command-and-control operations, aiming to blend in with normal traffic and evade detection.

Attacks included spear-phishing emails with RAR archives, deploying the Cobalt Strike loader "CloudyLoader" via DLL side-loading.

APT31 employed both publicly available and custom tools, maintaining persistence through scheduled tasks mimicking applications like Yandex Disk and Google Chrome.

The group exfiltrated data using cloud storage services, collecting sensitive information such as passwords from victim devices.

Russian cybersecurity firms identified overlaps with the EastWind threat cluster and documented these activities, highlighting the group's sophisticated methods.

The use of cloud services and social media profiles for staging encrypted commands allowed APT31 to remain undetected for extended periods, posing significant challenges for cybersecurity defenses.