• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
over 70 organizations across multiple sectors targeted by china linked cyber

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

You are here: Home / General Cyber Security News / Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group
June 9, 2025

The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a broader set of partially-related intrusions into several targets between July 2024 and March 2025.

“The victimology includes a South Asian government entity, a European media organization, and more than 70 organizations across a wide range of sectors,” security researchers Aleksandar Milenkoski and Tom Hegel said in a report published today.

Some of the targeted sectors include manufacturing, government, finance, telecommunications, and research. Also present among the victims was an IT services and logistics company that was managing hardware logistics for SentinelOne employees at the time of the breach in early 2025.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The malicious activity has been attributed with high confidence to China-nexus threat actors, with some of the attacks tied to a threat cluster dubbed PurpleHaze, which, in turn, overlaps with Chinese cyber espionage groups publicly reported as APT15 and UNC5174.

In late April 2024, SentinelOne first disclosed PurpleHaze-related reconnaissance activity targeting some of its servers that were deliberately accessible over the internet by “virtue of their functionality.”

Cybersecurity

“The threat actor’s activities were limited to mapping and evaluating the availability of select internet-facing servers, likely in preparation for potential future actions,” the researchers said.

It’s currently not known if the attackers’ intent was to just target the IT logistics organization or if they planned to expand their focus to downstream organizations as well. Further investigation into the attacks has uncovered six different activity clusters (named to A to F) that date back to June 2024 with the compromise of an unnamed South Asian government entity.

The clusters are listed below –

  • Activity A: An intrusion into a South Asian government entity (June 2024)
  • Activity B: A set of intrusions targeting organizations globally (Between July 2024 and March 2025)
  • Activity C: An intrusion into an IT services and logistics company (at the beginning of 2025)
  • Activity D: An intrusion into the same South Asian government entity compromised (October 2024)
  • Activity E: Reconnaissance activity targeting SentinelOne servers (October 2024)
  • Activity F: An intrusion into a leading European media organization (late September 2024)

The June 2024 attack against the government entity, as previously detailed by SentinelOne, is said to have led to the deployment of ShadowPad that’s obfuscated using ScatterBrain. The ShadowPad artifacts and infrastructure overlap with recent ShadowPad campaigns that have delivered a ransomware family codenamed NailaoLocker following the exploitation of Check Point gateway devices.

Subsequently in October 2024, the same organization was targeted to drop a Go-based reverse shell dubbed GoReShell that uses SSH to connect to an infected host. The same backdoor, SentinelOne noted, has been used in connection with a September 2024 attack aimed at a leading European media organization.

Also common to these two activity clusters is the use of tools developed by a team of IT security experts who go by the name The Hacker’s Choice (THC). The development marks the first time THC’s software programs have been abused by state-sponsored actors.

Cybersecurity

SentinelOne has attributed Activity F to a China-nexus actor with loose affiliations to an “initial access broker” tracked by Google Mandiant under the name UNC5174 (aka Uteus or Uetus). It’s worth noting that the threat group was recently linked to the active exploitation of SAP NetWeaver flaws to deliver GOREVERSE, a variant of GoReShell. The cybersecurity company is collectively tracking Activity D, E, and F as PurpleHaze.

“The threat actor leveraged ORB [operational relay box] network infrastructure, which we assess to be operated from China, and exploited the CVE-2024-8963 vulnerability together with CVE-2024-8190 to establish an initial foothold, a few days before the vulnerabilities were publicly disclosed,” the researchers said. “After compromising these systems, UNC5174 is suspected of transferring access to other threat actors.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «two distinct botnets exploit wazuh server vulnerability to launch mirai based Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
Next Post: CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog cisa adds erlang ssh and roundcube flaws to known exploited»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.