By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
Computing

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

News Room
Last updated: 2026/03/04 at 3:54 AM
News Room Published 4 March 2026
Share
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
SHARE

Ravie LakshmananMar 04, 2026Malware / Windows Security

Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been linked to cyber attacks targeting entities in Europe and Southeast Asia since at least mid-2024.

“Silver Dragon gains its initial access by exploiting public-facing internet servers and by delivering phishing emails that contain malicious attachments,” Check Point said in a technical report. “To maintain persistence, the group hijacks legitimate Windows services, which allows the malware processes to blend into normal system activity.”

Silver Dragon is assessed to be operating within the APT41 umbrella. APT41 is the cryptonym assigned to a prolific Chinese hacking group known for its targeting of healthcare, telecoms, high-tech, education, travel services, and media sectors for cyber espionage as early as 2012. It’s also believed to engage in financially motivated activity potentially outside of state control.

Attacks mounted by Silver Dragon have been found to primarily single out government entities, with the adversary using Cobalt Strike beacons for persistence on compromised hosts. It’s also known to employ techniques like DNS tunneling for command-and-control (C2) communication to bypass detection.

Check Point said it identified three different infection chains to deliver Cobalt Strike: AppDomain hijacking, service DLL, and email-based phishing.

“The first two infection chains, AppDomain hijacking and Service DLL, show clear operational overlap,” the cybersecurity company said. “They are both delivered via compressed archives, suggesting their use in post‑exploitation scenarios. In several cases, these chains were deployed following the compromise of publicly exposed vulnerable servers.”

The two chains a RAR archive containing a batch script, with the first chain using it to drop MonikerLoader, a NET-based loader responsible for decrypting and executing a second-stage directly in memory. The second stage, for its part, mimics MonikerLoader’s behavior, acting as a conduit for loading the final Cobalt Strike beacon payload.

On the other hand, the service DLL chain uses a batch script to deliver a shellcode DLL loader dubbed BamboLoader, which is registered as a Windows service. A heavily obfuscated C++ malware, it’s used to decrypt and decompress shellcode staged on disk, and inject it into a legitimate Windows process, such as “taskhost.exe.” The binary targeted for injection is configurable within BamboLoader.

The third infection chain involves a phishing campaign that has primarily targeted Uzbekistan with malicious Windows shortcuts (LNK) as attachments. The weaponized LNK file is designed to launch PowerShell code by means of “cmd.exe,” leading to the extraction and execution of next-stage payloads. This includes four different files –

  • Decoy document
  • Legitimate executable vulnerable to DLL side-loading (“GameHook.exe”)
  • Malicious DLL aka BamboLoader (“graphics-hook-filter64.dll”)
  • Encrypted Cobalt Strike payload (“simhei.dat”)

As part of this campaign, the decoy document is displayed to the victim, while, in the background, the rogue DLL is sideloaded via “GameHook.exe” to ultimately launch Cobalt Strike. The attacks are also characterized by the deployment of various post-exploitation tools –

  • SilverScreen, a .NET screen-monitoring tool used to capture periodic screenshots of user activity, including precise cursor positioning.
  • SSHcmd, a .NET command-line SSH utility that provides remote command execution and file transfer capabilities over SSH.
  • GearDoor, a NET backdoor that shares similarities with MonikerLoader and communicates with its C2 infrastructure via Google Drive.

Once executed, the backdoor authenticates to the attacker-controlled Google Drive account and uploads a heartbeat file containing basic system information. Interestingly, the backdoor utilizes different file extensions to indicate the nature of the task to be performed on the infected host. The results of the task execution are captured and uploaded to Drive.

  • *.png, to send heartbeat files.
  • *.pdf, to receive and execute commands, list the contents of a directory, make a new directory, and remove all files within a specified directory. The results of the operation are sent to the server in the form of a *.db file.
  • *.cab, to receive and execute commands to gather host information and a list of running processes, enumerate files and directories, run commands via “cmd.exe” or scheduled tasks, upload files to Google Drive, and terminate the implant. The execution status is uploaded as a .bak file.
  • *.rar, to receive and execute payloads. If the RAR file is named “wiatrace.bak,” the backdoor treats it as a self-update package. The results are uploaded as .bak files.
  • *.7z, to receive and execute plugins in memory. The results are uploaded as .bak files.

Silver Dragon’s links to APT41 stem from tradecraft overlaps with post-exploitation installation scripts previously attributed to the latter and the fact that the decryption mechanism used by BamboLoader has been observed in shellcode loaders linked to China-nexus APT activity.

“The group continuously evolves its tooling and techniques, actively testing and deploying new capabilities across different campaigns,” Check Point said. “The use of diverse vulnerability exploits, custom loaders, and sophisticated file-based C2 communication reflects a well-resourced and adaptable threat group.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article ANBERNIC just dropped a video for the RG VITA Pro, and it’s a dual-OS beast ANBERNIC just dropped a video for the RG VITA Pro, and it’s a dual-OS beast
Next Article The Classic Keanu Reeves Movie That Rivals The Matrix And John Wick Is Streaming On Hulu – BGR The Classic Keanu Reeves Movie That Rivals The Matrix And John Wick Is Streaming On Hulu – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Old ATI R300 Open-Source Driver Sees Another New Fix In 2026
Old ATI R300 Open-Source Driver Sees Another New Fix In 2026
Computing
I’d pay for YouTube Premium if it stopped spoiling everything
I’d pay for YouTube Premium if it stopped spoiling everything
News
Nomba partners Volume to let Nigerian merchants receive pounds
Nomba partners Volume to let Nigerian merchants receive pounds
Computing
Vue Router 5: File-Based Routing Into Core with No Breaking Changes
Vue Router 5: File-Based Routing Into Core with No Breaking Changes
News

You Might also Like

Old ATI R300 Open-Source Driver Sees Another New Fix In 2026
Computing

Old ATI R300 Open-Source Driver Sees Another New Fix In 2026

2 Min Read
Nomba partners Volume to let Nigerian merchants receive pounds
Computing

Nomba partners Volume to let Nigerian merchants receive pounds

6 Min Read
AMD Engineer Leverages AI To Help Make A Pure-Python AMD GPU User-Space Driver
Computing

AMD Engineer Leverages AI To Help Make A Pure-Python AMD GPU User-Space Driver

2 Min Read
Some NCBA investors may be forced into cash exit in Nedbank deal
Computing

Some NCBA investors may be forced into cash exit in Nedbank deal

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?