Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Sandworm Targets Critical OT Assets, Pivoting from
May 14, 2026
New Malware Framework: Screen Control, Browser & Enables Artifact
May 14, 2026
Home/Threats/Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
Threats

Chinese APT Exploits Microsoft Exchange to Breach Energy Networks

Chinese state-linked hacking group FamousSparrow has successfully breached an Azerbaijani oil and gas company, according to a detailed security report. The group exploited an unpatched Microsoft...

Marcus Rodriguez
Marcus Rodriguez
May 14, 2026 4 Min Read
2 0

Chinese state-linked hacking group FamousSparrow has successfully breached an Azerbaijani oil and gas company, according to a detailed security report. The group exploited an unpatched Microsoft Exchange server, deploying multiple backdoors deep within the network. This incident highlights ongoing threats to critical energy infrastructure, as outlined in the full analysis.

The attack ran from late December 2025 through late February 2026 and stands as one of the most detailed Chinese APT intrusions targeting energy infrastructure in the South Caucasus ever documented.

The threat group did not stop at one attempt. Attackers returned to the same compromised Exchange server three separate times, swapping malware families between visits and adjusting their tactics each time defenders tried to remove them.

That persistence signals a deliberate, sustained espionage campaign rather than an opportunistic breach.

Researchers at Bitdefender, who tracked the operation across all three activity waves, attributed the intrusion to FamousSparrow with moderate-to-high confidence, noting significant overlap with the Earth Estries threat cluster.

Evolution in the Deed RAT toolchain (Source - Bitdefender)
Evolution in the Deed RAT toolchain (Source – Bitdefender)

The timing is no coincidence. Azerbaijan has grown into a critical gas supplier for Europe after Russia’s Ukraine transit deal expired in 2024 and Strait of Hormuz disruptions in early 2026 reduced alternative energy sources.

Chinese APT Hackers Exploit Microsoft Exchange

The operation deployed two distinct backdoor families, Deed RAT and Terndoor, across different stages. Attackers also introduced an evolved DLL sideloading technique engineered to defeat automated security analysis, a level of sophistication rarely seen in prior campaigns tied to these malware families.

What followed was a layered operation that expanded analyst understanding of this group’s reach into energy targets.

The earliest signs of the intrusion date to December 25, 2025, when the Microsoft Exchange IIS worker process attempted to write a web shell into a publicly accessible directory on the server.

This action leveraged the ProxyNotShell exploit chain, two vulnerabilities tracked as CVE-2022-41040 and CVE-2022-41082 that allow unauthenticated remote code execution on unpatched Exchange servers.

In the days that followed, attackers dropped additional web shells with filenames such as key.aspx, log.aspx, errorFE_.aspx, and signout_.aspx. These provided a reliable foothold for issuing commands and staging further payloads.

A three-component malware chain was then deployed using files disguised as the legitimate LogMeIn Hamachi VPN application to reduce suspicion.

The loader file, LMIGuardianDll.dll, was placed alongside a genuine LogMeIn binary and sideloaded during normal startup. The Deed RAT payload was stored in an encrypted file named .hamachi.lng, decrypted in memory using AES-128 and RC4.

A Windows service mimicking LogMeIn Hamachi was also created to auto-launch the malware on every restart, locking in persistent access.

Advanced Evasion and Multi-Wave Persistence

What sets this campaign apart is the evolved DLL sideloading technique used to hide the Deed RAT loader. Unlike typical sideloading that triggers malicious code the moment a DLL is loaded, this version split its logic across two export functions named Init and ComMain.

The payload only runs after the host application follows a specific internal sequence of calls, meaning a sandbox examining the file in isolation sees no malicious behavior at all.

winMain flow of LMIGuardianSvc.exe (Source - Bitdefender)
winMain flow of LMIGuardianSvc.exe (Source – Bitdefender)

This design gates the infection behind a legitimate execution path. Security tools that inspect only portions of code find nothing to flag, and the full attack behavior is only visible when the application runs exactly as expected. That makes this sample significantly harder to detect during automated triage.

In the second wave, the group deployed a backdoor called Terndoor by hijacking the legitimate deskband_injector64.exe binary. The attempt was blocked, but forensic artifacts confirmed the malware had tried to install a kernel driver.

The third wave brought back a modified Deed RAT using sentinelonepro[.]com as its command-and-control address, impersonating a well-known security vendor to avoid detection in network logs.

Security teams should apply all available Exchange patches and rotate any exposed credentials without delay.

Monitoring should cover web shell writes through the IIS worker process, unsigned binaries patching Windows API functions in memory, and outbound HTTPS traffic to domains impersonating security vendors.

Unexpected RDP sessions using domain administrator accounts, followed quickly by PowerShell activity and new file downloads, should be treated as high-priority alerts.

Indicators of Compromise (IoCs):-

Type Indicator Description
MD5 Hash 0554f3b69d39d175dd110d765c11347a LMIGuardianSvc.exe — legitimate LogMeIn Hamachi binary used in Wave 1 sideloading chain
MD5 Hash 762f787534a891eca8aa9b41330b4108 USOShared.exe — renamed copy of deskband_injector64.exe used in Wave 2
File Name LMIGuardianDll.dll Malicious DLL loader sideloaded by LMIGuardianSvc.exe; deploys Deed RAT
File Name .hamachi.lng Encrypted Deed RAT payload, AES-128 + RC4 decrypted in memory
File Name lmiguardiandll.dll Alternate-casing malicious loader variant observed in initial Exchange exploitation stage
File Name key.aspx Web shell dropped via ProxyNotShell exploit on Exchange server
File Name log.aspx Web shell dropped via ProxyNotShell exploit on Exchange server
File Name errorFE_.aspx Web shell dropped via ProxyNotShell exploit on Exchange server
File Name signout_.aspx Web shell dropped via ProxyNotShell exploit on Exchange server
File Name winmm.dll Malicious loader DLL used in Wave 2 Terndoor sideloading chain
File Name vmflt.sys Driver that Terndoor malware attempted to install for kernel-level persistence
File Name cache.dat Assessed payload container associated with Terndoor deployment
Registry Key HKLMSYSTEMControlSet001Servicesvmflt Registry entries created by Terndoor to register kernel driver service
Domain (C2) virusblocker[.]it[.]com:443 Command-and-control address used by Wave 1 Deed RAT variant
Domain (C2) sentinelonepro[.]com:443 Command-and-control address used by Wave 3 modified Deed RAT variant
Domain ipinfo[.]io Legitimate service contacted by Wave 2 malware for network reconnaissance
CVE CVE-2022-41040 ProxyNotShell Exchange vulnerability exploited for initial access
CVE CVE-2022-41082 ProxyNotShell Exchange vulnerability exploited for initial access
Magic Value 0xFF66ABCD Updated Deed RAT module magic value (replaces 0xDEED4554 in older variants)
File Path C:Recovery File storage path used by Wave 3 Deed RAT components
File Path C:ProgramDataUSOShared File storage path used by Wave 2 Terndoor components
File Path C:TEMPLMIGuardianSvc.exe Initial staging path for Wave 1 Deed RAT loader
File Path C:Program Files (x86)LogMeIn Hamachi Final installation path mimicking legitimate LogMeIn Hamachi software

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVEExploitHackerMalwarePatchSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Sandworm Targets Critical OT Assets, Pivoting from

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Canon MailSuite Flaw Allows Remote Code Execution
May 14, 2026
Anthropic Mythos AI Finds macOS Flaws B Anthropic’s Reportedly
May 14, 2026
Hackers Compromise 170 npm Packages to Steal GitHub
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us