
Since 2020, CL-UNK-1068 has consistently targeted high-value organizations across South, Southeast, and East Asia. According to reports from Unit 42, their operations span across multiple critical sectors, including aviation, energy, government, law enforcement, pharmaceuticals, technology, and telecommunications. Although the group has not yet been attributed to a specifically numbered threat actor, current intelligence indicates that the operators are native Chinese speakers. We assess with medium-to-high confidence that their primary motivation is cyber-espionage.
The threat posed by CL-UNK-1068 is significant for several reasons:
The primary objective of this campaign is to gain a comprehensive map of victim environments and maintain long-term access to sensitive systems. After gaining an initial foothold, the attackers exfiltrate web application configuration files, credentials, browser data, sensitive spreadsheets/CSV files, SQL-related information, and MSSQL backup files. Such data breaches can expose internal infrastructure details, privileged access pathways, commercially sensitive records, and critical information protected by regulatory frameworks.
The breadth of the targeted sectors suggests broader strategic implications: Compromises of government and law enforcement sectors could leak internal communications, operational data, or investigative intelligence. Then infiltration of energy, aviation and telecom departments grants attackers deep intelligence on critical infrastructure, OT dependencies, and regional communication networks. The theft of proprietary technology or research data in pharmaceutical and technology organizations results in intellectual property loss and severely undermines long-term competitive advantages.
A successful breach also increases the risk of subsequent compromises. Security researchers have observed attackers harvesting credentials, exfiltrating passwords, and extracting stored access information from system administration and database tools. This means a single intrusion can facilitate lateral movement into other servers, database systems, and remote management pathways. While the current impact is primarily data theft, the leakage and secondary exploitation of stolen credentials creates a long-term exposure crisis that is difficult to remediate.
Furthermore, CL-UNK-1068 raises concerns regarding systemic resilience and hidden attack surfaces. While intelligence gathering appears to be the primary goal, some tools used—such as the Xnote Linux backdoor—possess capabilities for tunneling, reverse Shells, port forwarding, and even DDoS attacks. Should the attackers choose to pivot their objectives, the potential for operational disruption would far exceed the current scope.
To conclude, the sustained targeting, stealthy tactics, and data-leaking capabilities of CL-UNK-1068 represent a significant threat to national security, public utilities, and enterprise risk management.
The technical distinction of CL-UNK-1068 lies not in the use of a single custom malware family, but in its disciplined orchestration of Web Shells, DLL side-loading, tunneling tools, credential harvesters, and "Living off the Land" (LotL) techniques across both Windows and Linux environments. The intrusions typically originate from repeated compromises of Internet-facing systems—specifically web infrastructure—followed by low-profile internal expansion. After establishing an initial foothold via Web Shells, the actors leverage trusted system executables, in-memory payload execution, custom reconnaissance scripts, credential dumping, and reverse proxies to deepen access, move laterally, and stealthily exfiltrate sensitive data.
Initial Access
Initial access is primarily achieved by deploying Web Shells on Internet-facing servers. Attackers utilize variants of GodZilla and AntSword to establish a foothold; these Web Shells provide remote code execution (RCE) capabilities that serve as the foundation for subsequent intrusion phases. While intelligence does not fully detail every vulnerability path used for deployment, these compromises are linked to the exposure of web infrastructure. In some instances, custom Python executables are observed attempting to exploit CVE-2023-34048 (a VMware vCenter Server vulnerability).
Execution
Execution is highly flexible, utilizing both malware and legitimate system tools—most notably DLL side-loading via legitimate Python executables. Attackers place a legitimate python.exe or pythonw.exe in the same directory as a malicious DLL named python20.dll and a shellcode file (named to mimic a Python executable for obfuscation). When the trusted Python executable is launched, it side-loads the malicious DLL, which then performs the following:
This chain allows the attacker to hide tool execution within legitimate processes and significantly reduces the digital footprint left on the disk. Payloads launched via this method include:
Beyond the side-loading chain, the attackers directly execute tools such as:
Persistence
This campaign employs several persistence mechanisms. First, deployed Web Shells provide persistent access to compromised web servers, allowing attackers to return and execute commands at will. Then, custom FRP variants are used on both Windows and Linux to establish long-term reverse tunnels that bypass firewall restrictions. These samples contain unique embedded identifiers:
Even when direct access is restricted, these tunnels offer attackers a flexible means of entry.
Thirdly, on Linux, Xnote backdoor provides reverse Shell, file interaction, port forwarding, and tunneling capabilities, serving as both a backdoor and a persistence mechanism.
Lastly, in some cases, the custom PrintProgram tool is used to write Web Shells with elevated privileges, reinforcing the attacker's foothold and persistence.
Privilege Escalation
After gaining initial access, attackers utilize multiple escalation paths. On Windows, they use PrintSpoofer and its custom .NET variant, PrintProgram. Uniquely, PrintProgram is used both for escalation and for writing Web Shells under higher privilege contexts. They also use srunas.exe, a custom tool that duplicates access tokens from other processes to execute programs with higher authority.
Another observed tool is the Sliver implant, used as a privilege escalation Shell. It attempts to locate privileged processes like spoolsv.exe or lsass.exe and uses Parent ID spoofing to spawn cmd.exe as a child of these processes.
On Linux, they deploy PwnKit to exploit CVE-2021-4034 for local privilege escalation.
Defense Evasion
Defense evasion is central to the CL-UNK-1068 tradecraft. The most prominent example is the Python DLL side-loading chain, which abuses trusted executables to launch malicious code. By decrypting and executing payloads entirely in memory, they minimize disk artifacts and blend into legitimate process activities. Attackers also use obfuscated shellcode and batch scripts to clear Windows Event Logs via wevtutil. Furthermore, custom Python executables used for exploiting CVE-2023-34048 are compiled with Nuitka, likely to frustrate reverse engineering efforts.
Credential Access
Attackers use Mimikatz to pull passwords from memory and deploy LsaRecorder (which hooks LsaApLogonUserEx2 callbacks) to capture login passwords in real-time as they occur. They also use DumpIt and Volatility to capture system memory and extract:
In some cases, batch scripts can automate the aforementioned workflow.
Database credentials are also a target: the ssms.exe tool extracts stored connection info from sqlstudio.bin. Stolen configuration files like web.config and appsettings.json are harvested for connection strings and service credentials. Additionally, exported settings for RDP, VNC, and SSH are used to find stored credentials or pivot to systems where passwords might be reused.
Attackers also use scripts via Web Shells to access SAM and SYSTEM registry hives using reg save, supporting offline credential extraction.
Discovery
Upon establishing a foothold, attackers perform systematic, deep reconnaissance to map the local system, identify privileged users, and locate high-value data.
In the early phase, the custom .NET tool SuperDump collects extensive telemetry, including user info, IP addresses, running processes, installed software, and LSASS dumps. It specifically targets tools like Navicat, WinSCP, RDP, PuTTY, FileZilla, Xmanager, SSH info, PowerShell history and latest program records to reveal administrator habits or additional access paths.
Later, discovery shifts to batch scripts (via hp.bat, hpp.bat, and sometimes a.bat) that run native commands to enumerate the following information:
Attackers also export registry data associated with PuTTY, RDP, RealVNC, and TightVNC to identify previously accessed servers and, in some cases, recover stored credentials. This is a highly efficient method for mapping internal infrastructure based on the administrator's own connection history.
At the network level, attackers utilize ScanPortPlus, a custom scanning tool developed in Go (compiled for both Windows and Linux). This tool supports IP, port, and vulnerability scanning, enabling them to identify additional high-value targets and services following the initial breach.
The threat actors simultaneously exfiltrate website and application files. Harvesting web.config, .aspx, .asmx, .asax, .dll, and JSON files like appsettings.json from c:\inetpub\wwwroot expose application architectures, internal paths, hard-coded credentials, connection strings, and backend database relationships. This information assists attackers in determining which systems hosted sensitive services and where lateral movement would be most effective.
In summary, by employing a multi-layered combination of tool automation, scripted enumeration, registry mining, and active network scanning, the attackers establish a comprehensive view of the internal environment. This lays the groundwork for subsequent lateral movement, credential theft, and data exfiltration.
Lateral Movement
Following initial access, attackers move laterally to other hosts and SQL servers using:
A batch script is also used to weaken RDP security by disabling Network Level Authentication (NLA), possibly enabling lateral movements to other systems.
Collection
The attackers collect vast amounts of data related to espionage and future access. Their initial collection targets were typically website files located in c:\inetpub\wwwroot, including:
These files were archived under names such as web.rar, web1.rar, and web2.rar.
Additionally, they collect:
sqlstudio.binThe batch script workflow also produced multiple .txt and .db outputs, which were then archived as host.rar using rar.bat or rr.bat.
Command and Control (C2)
This incident involved a variety of C2 mechanisms.
The most straightforward method utilizes Web Shells, which allows operators to issue remote commands and receive output directly from the compromised servers. To achieve more persistent and flexible control, the attackers deploy customized FRP executables to establish reverse proxy tunnels. These tunnels effectively bypass firewalls and extend C2 access deeper into the victim's network.
On Linux systems, Xnote provides further C2 capabilities, including:
Together, these mechanisms enable the attackers to maintain interactive control over systems within isolated or restricted network environments.
Exfiltration
Instead of direct file transfers, attackers often use a three-step stealth exfiltration method:
This enables them to exfiltrate data through existing shell output streams, eliminating the need to upload files via independent transfer mechanisms. This low-friction approach is ideal for restricted environments where only shell access is available and likely aided in evading certain network-based detection mechanisms.
This technique is utilized to exfiltrate archived website files and the sqlstudio.bin file. Other exfiltrated data include browser-related information, spreadsheets, CSV files, MSSQL backups, and SQL data likely accessed directly via usql.
Impact
The Xnote Linux backdoor includes DDoS capabilities, supporting attack tasks such as CC, NTP, SYN flooding, and UDP flooding. While the report does not indicate that these features are actively used against the victim, the capabilities are present.
The attackers also performed log clearing using wevtutil, which hinders forensic visibility and incident response efforts. Additionally, they weaken RDP security by disabling NLA (Network Level Authentication), degrading the security posture of the affected systems. The use of PrintProgram to drop privilege-escalated Web Shells further compromises system integrity by strengthening the attackers' control.
From a technical perspective, this incident is driven by the compromise of exposed web infrastructure, followed by stealthy post-exploitation via Web Shells, Python DLL side-loading, credential theft, internal scanning, reverse tunneling, and low-noise exfiltration methods. The attackers' success stems from a chain of simple yet highly effective techniques: abusing trusted processes, in-memory payload execution, large-scale host discovery, credential harvesting, and the creative use of native tools to exfiltrate data without leaving a conspicuous transmission footprint.
Defending against the threat of CL-UNK-1068 cannot rely on blocking a few indicators of compromise (IOCs) alone. The attack patterns revealed in this campaign represent a long-term, cross-platform methodology reliant on Web Shells, credential theft, DLL side-loading, tunneling, privilege escalation, and covert exfiltration. Because the attackers frequently leverage legitimate tools and common system utilities, organizations must prioritize hardening, attack surface reduction, and behavioral-based detection across both Windows and Linux environments.
1. Reduce Exposure of Internet-Facing Systems
The primary task is to shrink the attack surface of externally accessible services. Reports indicate that attackers likely abused public-facing web infrastructure and attempted to exploit vulnerabilities in VMware vCenter Server, including CVE-2023-34048.
Most directly impacted by the aforementioned measures include:
2. Proactively Hunt for Web Shells and Abused Web Content
Since attackers use GodZilla and AntSword variants as primary tools, defenders should inspect web servers for unauthorized files. Focus on:
web.configSecurity teams should verify file integrity, review recent modifications in web directories, and restrict write access to production web roots (e.g., c:\inetpub\wwwroot).
3. Detect Signature Behaviors Rather Than Sole Known Malware
Move beyond static indicators to detect these three critical behaviors:
This means organizations should monitor for the following behaviors:
The scope of this mitigation strategy encompasses:
4. Harden Credential and Privileged Access Management
A critical phase of this incident involves credential theft. The attackers utilize Mimikatz, LsaRecorder, DumpIt, Volatility, and registry dumping via Web Shells, while also harvesting connection histories and saving credentials from tools such as PuTTY, WinSCP, RDP clients, VNC utilities, and SQL Server Management Studio (SSMS).
Organizations should implement the following response measures:
reg save HKLM\SAMreg save HKLM\SYSTEMThe scope of these measures will impact:
5. Strengthen Remote Access Controls
Attackers are observed weakening RDP security by disabling Network Level Authentication (NLA) and collecting remote access data from RDP, PuTTY, RealVNC, and TightVNC. To mitigate this risk, organizations should:
The scope of these actions directly impacts:
6. Restrict Lateral Movement and Internal Discovery
Attackers conduct large-scale host and network discovery, scan internal systems, and move laterally to SQL servers and other hosts. Defenders mitigate the ease of lateral movement through the following measures:
The scope of these mitigation measures affects:
7. Detect and Block Tunneling and Anomalous Egress
The use of FRP serves as a critical mechanism for persistence and firewall evasion in this attack. Organizations identify and block unauthorized tunneling and reverse proxy activity through the following measures:
Linux systems require specific attention, as the report emphasizes the importance of detecting the following behaviors:
The scope of these mitigation measures includes:
8. Mitigate Covert Exfiltration
The attackers employ a simple yet evasive exfiltration method: archiving files with WinRAR, encoding them using certutil -encode, and printing the Base64 output via a Web Shell using the type command. Organizations monitor and restrict these behavioral patterns, especially on servers where such operations are non-standard.
High-value detection items include:
web.configappsettings.jsonThis detection is particularly relevant to the following environments:
9. Enhance Visibility and Forensic Readiness
Since the attackers utilize anti-forensic techniques, such as clearing logs with wevtutil, defenders must secure evidence rapidly and maintain robust telemetry collection capabilities. The following measures are recommended:
The scope of these measures affects:
10. Multi-Layered Security Controls
The report indicates that an organization's defensive capabilities improve significantly when multiple security layers are implemented simultaneously. In practice, defenders should combine the following measures:
While these controls do not guarantee total immunity from intrusion, they substantially increase the chances of early detection, limit persistence, and reduce the risk of data loss.
Priorities for Impacted Sectors
For organizations in Aviation, Energy, Gov, Pharma, and Telecom, the immediate priorities are:
In summary, the most effective mitigation strategy for this incident is a comprehensive combination of patching, attack surface reduction, credential protection, network segmentation, and behavior-based monitoring. This strategy is indispensable because the threat actor’s tactics are specifically designed to blend into normal system administration activities, allowing them to remain undetected for extended periods.
CyCraft is a cybersecurity company founded in 2017, focusing on autonomous AI technology. Headquartered in Taiwan, it has subsidiaries in Japan and Singapore. CyCraft provides professional cybersecurity services to government agencies, police and defense forces, banks, and high-tech manufacturers throughout the Asia-Pacific region. It has received strong backing from the CID Group and Pavilion Capital, a Temasek Holdings Private Limited subsidiary.