Subscribe

Social Media Links

Insights

 | 3 minute read

Ankura CTIX FLASH Update – March 17, 2026

Malware Activity

Fake VPNs and Malware Campaigns


Threat Actor Activity

China-Linked Cyber Espionage Targets Southeast Asian Military Organizations

Palo Alto Networks Unit 42 has identified a suspected China-based cyber espionage operation, by CL-STA-1087. CL STA-1087 has targeted Southeast Asian military organizations since at least 2020. The campaign focuses on collecting intelligence related to military capabilities, organizational structures, and collaboration with Western armed forces. Demonstrating strategic patience, the attackers maintained dormant access for months, allowing them to conduct highly targeted intelligence collection rather than bulk data theft. The operation employs advanced persistent threat (APT) strategies, including custom tools like AppleChris and MemFun backdoors, and the Getpass credential harvester. These tools facilitate sustained unauthorized access to compromised systems, allowing for precise intelligence gathering. The hackers deploy PowerShell scripts to create reverse shells to command-and-control (C2) servers and use DLL hijacking for persistence and payload execution. They exploit Windows environments, targeting domain controllers, web servers, and executive systems. AppleChris variants use Pastebin and Dropbox for C2 communication, dynamically resolving IP addresses to execute commands and perform data operations. MemFun functions as a modular malware platform, leveraging reflective DLL loading to execute backdoor operations. Getpass, a custom version of Mimikatz, targets Windows authentication packages for credential harvesting. The campaign’s infrastructure and operational schedule align with UTC+8 time zone, suggesting a China-based origin, as noted by Unit 42. Palo Alto Networks’ report highlights, in addition, that the espionage group’s use of China-based cloud network infrastructure, Simplified Chinese on a login page, and their focus on military organizational structures and strategic systems suggests state-sponsored backing and China-based operations. CTIX Analysts will continue to stay ahead of the latest Threat Actor activities and operations.


Vulnerabilities

CISA Warns of Actively Exploited Wing FTP Server Vulnerability That Could Enable RCE Attacks

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with