China government-bound hackers caught running a severely dangerous ransomware fidus


  • Symantec researchers observed Chinese state-sponsored threat actors running ransomware against an Asian software and service company
  • They claim that it is very unusual activity for state attack
  • The attackers demanded $ 2 million in ransom

Emperor Dragonfly, a well -known Chinese state -sponsored threat actor, recently did something unusual – it implemented a ransomware encryption on a target network.

A report from Symantec’s threat Hunter -Team, who observed the attack by the end of 2024, noticed how on several occasions they had observed that the group does what it usually does -side -loading malicious DLL files (via a legitimate toshiba executable) to drop the back doors and establish persistence. The goal was, as is usual with state-sponsored attackers, cyber-spyage.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top