Monday, April 28, 2025
HomeCyber Security NewsCrimson Palace Returns With New Hacking Tolls And Tactics

Crimson Palace Returns With New Hacking Tolls And Tactics

Published on

SIEM as a Service

Follow Us on Google News

Cluster Bravo, despite its brief initial activity, subsequently targeted 11 organizations in the same region, as researchers found that these attackers used compromised environments within the same vertical for malware staging. 

Cluster Charlie, after being disrupted, returned with new techniques, including using the HUI loader to inject Cobalt Strike beacons into mstsc.exe. 

They employed open-source tools and leveraged techniques from other threat clusters to re-establish their presence and bypass EDR software by shifting their primary focus to re-establishing and extending their foothold on the target network.

- Advertisement - Google News
Stage 2 Timeline

Threat actors switched tactics after Sophos blocked their C2 tools by leveraging stolen credentials to deploy web shells for reconnaissance and DLL sideloading.

Open-source tools like Havoc and SharpHound were used for further intel gathering on Active Directory and network layout. 

Attackers also adopted tactics from other threat clusters, like using Impacket atexec on unmanaged devices for remote execution and lateral movement, highlighting a potential overarching organization behind these activities.  

A map of the flow of attack chains used by the threat actor during the second phase of the intrusion

The APT actor leveraged stolen credentials and a web shell to inject a malicious DLL into a legitimate Windows process and then performed reconnaissance tasks by querying Windows Defender exclusion paths, Sophos security policies, and Active Directory infrastructure using SharpHound. 

The actor also used the compromised credentials to move laterally and establish persistence on a hypervisor by creating a scheduled task to execute another malicious DLL.  

In December 2023, Cluster Charlie attackers compromised administrator credentials and user data and conducted reconnaissance. In 2024, they rapidly cycled through C2 channels and deployment methods likely to evade detection. 

The continued threat activity in 2024  

Their tactics included deploying modified versions of legitimate tools like RealBlindingEDR (asoc.exe, ssoc.exe) to disable endpoint protection via a vulnerability (CVE-2023-38817) in an anti-cheat tool (Echo.ac) and tamper with kernel routines. 

In February and March 2024, a threat actor was observed rapidly changing tactics and tools to evade detection by switching C2 implants (Havoc, Cobalt Strike) and frameworks (Havoc, XieBroC2) while using Donut shellcode loaders to inject malicious payloads. 

 A screenshot of the TattleTale malware command line

They also abused legitimate executables (jcef_helper.exe, jconsole.exe) to sideload malicious DLLs (libcef.dll, jli.dll) for further obfuscation and persistence. 

The DLLs sometimes checked for debuggers and security tools before injecting payloads and connecting to C2 servers in Cyprus, the United States, Japan, and Singapore.

In April, attackers abused legitimate apps (identity_helper.exe) to sideload malicious DLLs (Havoc implants) and a custom keylogger (TattleTale, steals LSA info, browser data) and also deployed another keylogger (r1.exe) to disable EDR and access Chrome data, while in June, they used Impacket to install a Cloudflared tunnel after disabling endpoint protection.  

The threat actors behind this ongoing cyberespionage campaign continue to target Sophos customers in the same region by constantly evolving their tactics and tools, using a mix of custom and open-source tools to bypass security measures. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...