The backdoor was hidden in a folder mimicking the legitimate LogMeIn Hamachi installation, and persistence was achieved through a service masquerading as LogMeIn Hamachi, which was launched at system startup.After compromising the initial host, the attackers abused RDP to access a second server, logged in to an administrator account, and then deployed Deed RAT, likely as part of hands-on keyboard activity. Next, they used Impacket tools to compromise a third host.A month later, after the malware was removed from at least one host, the hackers accessed the initially compromised server and deployed the TernDoor backdoor, which waslinkedto Salt Typhoon by Cisco’s Talos security researchers.At the end of February, the APT accessed the victim organization’s environment again, attempting to redeploy Deed RAT using the same execution chain.“This intrusion should not be viewed as an isolated compromise, but as a sustained and adaptive operation conducted by an actor that repeatedly sought to regain and extend access within the victim environment. Across multiple waves of activity, the same access path was revisited, new payloads were introduced, and additional footholds were established,” Bitdefender notes.Twill Typhoon attacksBeginning September 2025 and continuing through at least April 2026,Darktraceobserved the China-linked APT Twill Typhoon (also known as Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, and TA416) targeting entities in the Asia-Pacific and Japan (APJ) region with an updated arsenal, including a modular .NET-based RAT framework.Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs.The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading.During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

After compromising the initial host, the attackers abused RDP to access a second server, logged in to an administrator account, and then deployed Deed RAT, likely as part of hands-on keyboard activity. Next, they used Impacket tools to compromise a third host.A month later, after the malware was removed from at least one host, the hackers accessed the initially compromised server and deployed the TernDoor backdoor, which waslinkedto Salt Typhoon by Cisco’s Talos security researchers.At the end of February, the APT accessed the victim organization’s environment again, attempting to redeploy Deed RAT using the same execution chain.“This intrusion should not be viewed as an isolated compromise, but as a sustained and adaptive operation conducted by an actor that repeatedly sought to regain and extend access within the victim environment. Across multiple waves of activity, the same access path was revisited, new payloads were introduced, and additional footholds were established,” Bitdefender notes.Twill Typhoon attacksBeginning September 2025 and continuing through at least April 2026,Darktraceobserved the China-linked APT Twill Typhoon (also known as Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, and TA416) targeting entities in the Asia-Pacific and Japan (APJ) region with an updated arsenal, including a modular .NET-based RAT framework.Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs.The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading.During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

A month later, after the malware was removed from at least one host, the hackers accessed the initially compromised server and deployed the TernDoor backdoor, which waslinkedto Salt Typhoon by Cisco’s Talos security researchers.At the end of February, the APT accessed the victim organization’s environment again, attempting to redeploy Deed RAT using the same execution chain.“This intrusion should not be viewed as an isolated compromise, but as a sustained and adaptive operation conducted by an actor that repeatedly sought to regain and extend access within the victim environment. Across multiple waves of activity, the same access path was revisited, new payloads were introduced, and additional footholds were established,” Bitdefender notes.Twill Typhoon attacksBeginning September 2025 and continuing through at least April 2026,Darktraceobserved the China-linked APT Twill Typhoon (also known as Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, and TA416) targeting entities in the Asia-Pacific and Japan (APJ) region with an updated arsenal, including a modular .NET-based RAT framework.Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs.The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading.During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

At the end of February, the APT accessed the victim organization’s environment again, attempting to redeploy Deed RAT using the same execution chain.“This intrusion should not be viewed as an isolated compromise, but as a sustained and adaptive operation conducted by an actor that repeatedly sought to regain and extend access within the victim environment. Across multiple waves of activity, the same access path was revisited, new payloads were introduced, and additional footholds were established,” Bitdefender notes.Twill Typhoon attacksBeginning September 2025 and continuing through at least April 2026,Darktraceobserved the China-linked APT Twill Typhoon (also known as Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, and TA416) targeting entities in the Asia-Pacific and Japan (APJ) region with an updated arsenal, including a modular .NET-based RAT framework.Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs.The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading.During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

“This intrusion should not be viewed as an isolated compromise, but as a sustained and adaptive operation conducted by an actor that repeatedly sought to regain and extend access within the victim environment. Across multiple waves of activity, the same access path was revisited, new payloads were introduced, and additional footholds were established,” Bitdefender notes.Twill Typhoon attacksBeginning September 2025 and continuing through at least April 2026,Darktraceobserved the China-linked APT Twill Typhoon (also known as Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, and TA416) targeting entities in the Asia-Pacific and Japan (APJ) region with an updated arsenal, including a modular .NET-based RAT framework.Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs.The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading.During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

Beginning September 2025 and continuing through at least April 2026,Darktraceobserved the China-linked APT Twill Typhoon (also known as Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, and TA416) targeting entities in the Asia-Pacific and Japan (APJ) region with an updated arsenal, including a modular .NET-based RAT framework.Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs.The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading.During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

Multiple infected hosts, the security firm reports, were seen making requests to domains impersonating content delivery networks (CDNs), including Yahoo and Apple services, and retrieving legitimate binaries alongside matching .config files and malicious DLLs.The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading.During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

The fetched sequence, a hallmark of China-nexus campaigns, leads to the execution of a new RAT framework dubbed FDMTP, via DLL sideloading.During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

During attacks observed in September and October, the compromised hosts retrieved a DLL from the same external hosts repeatedly. In April, a system within a financial organization’s network fetched a legitimate binary and then repeatedly retrieved config files and DLL components.The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

The attackers relied on Visual Studio hosting and the legitimate Windows ClickOnce engine to ensure the malware’s execution. The main payload was a modular framework relying on various plugins for backdoor functionality.The RAT supports system fingerprinting, command execution, manipulating Windows tasks, managing registry persistence, manipulating system processes, and retrieving files and commands.“Intrusions are not dependent on a single foothold, but distributed across components that can be updated, replaced, or reloaded independently. This approach is consistent with broader China-nexus tradecraft,” Darktrace notes.Related:Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingRelated:China-Linked APT GopherWhisper Abuses Legitimate Services in Government AttacksRelated:Most Serious Cyberattacks Against the UK Now From Russia, Iran and China, Cyber Chief SaysRelated:FBI Warns of Data Security Risks From China-Made Mobile Apps

Source: SecurityWeek