top of page

Covert Espionage: State-Backed Actors Deploy HazyBeacon in SEA Campaign

ree

๐—ฃ๐—ฎ๐—น๐—ผ ๐—”๐—น๐˜๐—ผ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ๐˜€โ€™ ๐—จ๐—ป๐—ถ๐˜ ๐Ÿฐ๐Ÿฎ has uncovered a new state-backed cyber espionage campaign dubbed CL-STA-1020, actively ๐˜ต๐˜ข๐˜ณ๐˜จ๐˜ฆ๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜จ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ข๐˜ญ ๐˜ฃ๐˜ฐ๐˜ฅ๐˜ช๐˜ฆ๐˜ด in Southeast Asia. Central to this operation is a newly identified Windows backdoor named ๐—›๐—ฎ๐˜‡๐˜†๐—•๐—ฒ๐—ฎ๐—ฐ๐—ผ๐—ป, believed to be leveraged by a state-aligned threat group with strong geopolitical motives.


This campaign primarily seeks intelligence related to tariff policies, trade negotiations, and regulatory decisionsโ€”key levers in the Southeast Asian regionโ€™s strategic importance in U.S.โ€“China dynamics. The operation underlines the growing trend of leveraging legitimate cloud infrastructure to conduct stealthy cyber intrusions.


๐Ÿ” ๐—ง๐—ง๐—ฃ๐˜€: ๐—ง๐—ฟ๐—ฎ๐—ฑ๐—ฒ๐—ฐ๐—ฟ๐—ฎ๐—ณ๐˜ & ๐—ง๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—ฐ๐—ฎ๐—น ๐—œ๐—ป๐˜€๐—ถ๐—ด๐—ต๐˜๐˜€

While the initial access vector remains unconfirmed, telemetry suggests that HazyBeacon is delivered via DLL side-loading:

ย ย โ€ข ๐Ÿงช Malicious mscorsvc.dll dropped alongside legitimate mscorsvw.exe

ย ย โ€ข ๐ŸŸข Executed to initiate the HazyBeacon infection chain

ย ย โ€ข ๐Ÿ–ฅ๏ธ Persistence via service registration (autostarts with reboot)

DLLL sideloading of the HazyBeacon DLL
DLLL sideloading of the HazyBeacon DLL

Once active, HazyBeacon establishes outbound C2 over AWS Lambda URLs, allowing:

ย ย โ€ข ๐Ÿ”„ Encrypted command execution via *.lambda-url.*.amazonaws.com

ย ย โ€ข ๐Ÿ“ฆ Download of additional payloads, including a file collector module

ย ย โ€ข ๐Ÿ—ƒ๏ธ Harvesting of sensitive file types (e.g., .doc, .xls, .pdf) modified within a specific time frame

ย ย โ€ข โ˜๏ธ Exfiltration attempts via Dropbox and Google Drive

ย ย โ€ข ๐Ÿงน Cleanup stage to remove artifacts and cover tracks


This technique of abusing cloud-native functions is an evolving tactic in modern APT operationsโ€”known as living-off-trusted-services (LOTS).


๐ŸŒ ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—œ๐—บ๐—ฝ๐—ฎ๐—ฐ๐˜

The HazyBeacon campaign ๐—ฝ๐—ฟ๐—ถ๐—บ๐—ฎ๐—ฟ๐—ถ๐—น๐˜† ๐˜๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜๐˜€ ๐—ด๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ป๐—บ๐—ฒ๐—ป๐˜ ๐—บ๐—ถ๐—ป๐—ถ๐˜€๐˜๐—ฟ๐—ถ๐—ฒ๐˜€, ๐˜๐—ฟ๐—ฎ๐—ฑ๐—ฒ ๐—ฑ๐—ฒ๐—ฝ๐—ฎ๐—ฟ๐˜๐—บ๐—ฒ๐—ป๐˜๐˜€, and ๐—ฝ๐—ผ๐—น๐—ถ๐—ฐ๐˜†-๐—บ๐—ฎ๐—ธ๐—ถ๐—ป๐—ด ๐—ฏ๐—ผ๐—ฑ๐—ถ๐—ฒ๐˜€ across Southeast Asia, suggesting a clear intent ๐˜๐—ผ ๐—ด๐—ฎ๐˜๐—ต๐—ฒ๐—ฟ ๐—ถ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ ๐˜๐—ถ๐—ฒ๐—ฑ ๐˜๐—ผ ๐—ฟ๐—ฒ๐—ด๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—ด๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ป๐—ฎ๐—ป๐—ฐ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—ฒ๐—ฐ๐—ผ๐—ป๐—ผ๐—บ๐—ถ๐—ฐ ๐˜€๐˜๐—ฟ๐—ฎ๐˜๐—ฒ๐—ด๐˜†. Exfiltrated data is believed to ๐˜ช๐˜ฏ๐˜ค๐˜ญ๐˜ถ๐˜ฅ๐˜ฆ ๐˜ด๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ฎ๐˜ข๐˜ต๐˜ฆ๐˜ณ๐˜ช๐˜ข๐˜ญ๐˜ด such as unpublished tariff documents, internal policy briefs, and strategic negotiation content. By leveraging legitimate services like AWS Lambda, Dropbox, and Google Drive for command-and-control and data exfiltration, the attackers successfully ๐—ฏ๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐—ฐ๐—ผ๐—ป๐˜ƒ๐—ฒ๐—ป๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—ป๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ฑ๐—ฒ๐—ณ๐—ฒ๐—ป๐˜€๐—ฒ๐˜€, making detection and attribution more difficult. This operation underscores a broader intelligence-gathering agenda likely linked to state interests, particularly those navigating the geopolitical complexities of U.S.โ€“China influence, regional trade alignments, and defense modernization efforts.


๐Ÿ”Ž ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ฅ๐—ฒ๐—ฐ๐—ผ๐—บ๐—บ๐—ฒ๐—ป๐—ฑ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€:

ย ย โ€ข Monitor outbound traffic to AWS Lambda endpoints (*.lambda-url.*.amazonaws.com) for unusual or nonstandard use cases

ย ย โ€ข Deploy behavior-based detection to flag DLL side-loading activity and abnormal service creation

ย ย โ€ข Analyze parent-child process relationships for mscorsvw.exe


โš™๏ธ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐˜€๐—ถ๐˜ƒ๐—ฒ ๐—”๐—ฐ๐˜๐—ถ๐—ผ๐—ป๐˜€:

ย ย โ€ข Block unauthorized use of cloud storage services (Dropbox, Google Drive) at perimeter

ย ย โ€ข Use cloud traffic inspection tools capable of decrypting and logging cloud API usage

ย ย โ€ข Implement endpoint controls to restrict DLL loading from user-writable directories


๐Ÿงฉ ๐—–๐—ผ๐—ป๐—ฐ๐—น๐˜‚๐˜€๐—ถ๐—ผ๐—ป

The HazyBeacon malware campaign ๐—ฒ๐˜…๐—ฒ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐—ถ๐—ฒ๐˜€ ๐˜๐—ต๐—ฒ ๐˜€๐—ผ๐—ฝ๐—ต๐—ถ๐˜€๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ผ๐—ณ ๐—บ๐—ผ๐—ฑ๐—ฒ๐—ฟ๐—ป ๐—ฐ๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ฒ๐˜€๐—ฝ๐—ถ๐—ผ๐—ป๐—ฎ๐—ด๐—ฒโ€”where trusted platforms are co-opted to hide state-sponsored operations in plain sight. For defenders, traditional IOCs are no longer enough. The emphasis must shift to context-aware baselining, cloud telemetry visibility, and adaptive controls that detect when familiar tools are used for unfamiliar purposes.


ย 
ย 
ย 

Comments


Address: Office B322, Level 3, Spaces, Platinum Sentral, KL Sentral, 50470 Kuala Lumpur.

  • Facebook
  • Instagram
  • LinkedIn

Hotline+60327224705

© 2025 Vardaan Sdn Bhd. All Rights Reserved.

bottom of page