Back to Feed
Nation-stateMay 14, 2026

Chinese APTs Expand Targets, Update Backdoors in Recent Campaigns

Salt Typhoon and Twill Typhoon expand targeting with updated backdoors across Azerbaijan, Asia-Pacific regions.

Summary

Two China-linked APT groups have intensified operations with expanded targeting and updated malware tools. Salt Typhoon targeted an Azerbaijani energy company using ProxyNotShell exploits and updated Deed RAT via DLL sideloading, while Twill Typhoon has targeted Asia-Pacific entities with a new modular .NET-based RAT framework called FDMTP. Both campaigns demonstrate sustained, adaptive intrusion activity with repeated access attempts and payload updates.

Full text

China-linked state-sponsored hackers have been observed expanding their targets and updating malicious tools in fresh campaigns that either follow known patterns or adapt to current political events. Between December 2025 and February 2026, Salt Typhoon, also known as Earth Estries, FamousSparrow, GhostEmperor, and UNC2286, and considered one of the most aggressive Chinese APTs, was seen targeting an Azerbaijani oil and gas company, Bitdefender reports. The campaign marked a shift from typical Salt Typhoon activity and was apparently aimed at government, telecoms, and technology entities in the US, Asia, the Middle East, and Africa, likely triggered by Azerbaijan’s recently increased role in European energy security. According to Bitdefender, as a result of Russia’s Ukraine gas transit agreement expiration and the recent Strait of Hormuz disruptions, Azerbaijan has become a strategic energy partner for European countries, putting it in APT crosshairs. The recently observed intrusion, attributed with moderate-to-high confidence to Salt Typhoon, started with Microsoft Exchange vulnerability exploitation, followed by web shell deployment, command execution, DLL sideloading, and backdoor deployment. In December, the threat actor used the ProxyNotShell exploit chain for code execution on Exchange servers, deployed web shells to establish a foothold, and then deployed the Deed RAT via an updated DLL sideloading technique.Advertisement. Scroll to continue reading. The backdoor was hidden in a folder mimicking the legitimate LogMeIn Hamachi installation, and persistence was achieved through a service masquerading as LogMeIn Hamachi, which was launched at system startup. After compromising the initial host, the attackers abused RDP to access a second server, logged in to an administrator account, and then deployed Deed RAT, likely as part of hands-on keyboard activity. Next, they used Impacket tools to compromise a third host. A month later, after the malware was removed from at least one host, the hackers accessed the initially compromised server and deployed the TernDoor backdoor, which was linked to Salt Typhoon by Cisco’s Talos security researchers. At the end of February, the APT accessed the victim organization’s environment again, attempting to redeploy Deed RAT using the same execution chain. “This intrusion should not be viewed as an isolated compromise, but as a sustained and adaptive operation conducted by an actor that repeatedly sought to regain and extend access within the victim environment. Across multiple waves of activity, the same access path was revisited, new payloads were introduced, and additional footholds were established,” Bitdefender notes. Twill Typhoon attacks Beginning September 2025 and continuing through at least April 2026, Darktrace observed the China-linked APT Twill Typhoon (also known as Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, and TA416) targeting entities in the Asia-Pacific and Japan (APJ) region with an updated arsenal, including a modular .NET-based RAT framework. Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs. The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading. During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components. The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality. The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands. “Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes. Related: Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State Hacking Related: China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks Related: Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief Says Related: FBI Warns of Data Security Risks From China-Made Mobile Apps Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. Daily Briefing Newsletter Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights. More from Ionut Arghire Apple Rejected 2 Million App Store Submissions in 2025 for Security and Fraud PreventionSocket Raises $60 Million at $1 Billion ValuationMicrosoft Patches Exploited UnDefend and RedSun Defender Zero-DaysMicrosoft Rolls Out Mitigations for ‘YellowKey’ BitLocker BypassOver 320 NPM Packages Hit by Fresh Mini Shai-Hulud Supply Chain AttackGitHub Confirms Hack Impacting 3,800 Internal RepositoriesVerizon DBIR 2026: Vulnerability Exploitation Overtakes Credential Theft as Top Breach VectorUnpatched ChromaDB Vulnerability Can Lead to Server Takeover Latest News Drupal Vulnerability in Hacker Crosshairs Shortly After DisclosureIn Other News: Industrial Router Exploitation, CISA KEV Nomination Form, Gas Station HackingCanadian Man Arrested for Operating Kimwolf Botnet‘First VPN’ Cybercrime Service Disrupted, Administrator ArrestedTrendAI Patches Apex One Zero-Day Exploited in the WildGrafana Says Codebase and Other Data Stolen via TanStack Supply Chain AttackCisco Patches Critical Vulnerability in Secure WorkloadOcean Emerges From Stealth With $28M for Agentic Email Security Platform Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register Webinar: Third-Party Risk in Practice June 4, 2026 Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice. Register People on the MoveJoe Chen has become Chief Technology Officer at Trellix.Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.SecureAuth has named Mark van Oppen as Chief Revenue Officer.More People On The MoveExpert Insights Caught Off Guard: Securing AI After It Hits Production As enterprises rush AI projects into production, security teams are increasingly being forced into reactive mode. (Joshua Goldfarb) Cyber Resilience is the New Business Continuity Plan The organizations best prepared to face disruption are those that align security, continuity and risk management around what the business cannot afford to lose. (Steve Durbin) Enhancing Data Center Security Without Sacrificing Performance For AI data centers, where the stakes are the highest and performance constraints are the tightest, security and performance are no longer a zero-sum game. (Nadir Izrael) Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The

Indicators of Compromise

  • malware — Deed RAT
  • malware — TernDoor
  • malware — FDMTP

Entities

Salt Typhoon (threat_actor)Twill Typhoon (threat_actor)Microsoft (vendor)Bitdefender (vendor)Cisco (vendor)Darktrace (vendor)