China-Aligned APT Groups Deploy PeckBirdy JScript Framework for Fileless Attacks on Government Targets

China-Aligned APT Groups Deploy PeckBirdy JScript Framework for Fileless Attacks on Government Targets

China-aligned advanced persistent threat groups have been using a previously undocumented JScript-based command-and-control framework called PeckBirdy to conduct fileless attacks against Asian government entities, educational institutions, and Chinese gambling operations since 2023, according to research published by Trend Micro.

PeckBirdy is built entirely in JScript and leverages the Windows Script Host to execute commands without dropping files that antivirus software might detect. By injecting code dynamically at runtime, the framework leaves almost no physical footprint on compromised systems.

Fileless Execution Evades Detection

The framework's design prioritizes stealth over capability. Trend Micro researchers noted that detecting malicious JavaScript frameworks remains a significant challenge due to their use of dynamically generated, runtime-injected code and the absence of persistent file artifacts.

PeckBirdy enables flexible deployment across multiple environments, allowing attackers to execute commands on compromised systems while maintaining minimal forensic evidence. The lightweight nature of the script-based framework makes it particularly difficult for traditional security tools to identify and block.

Modular Backdoors Extend Capabilities

PeckBirdy rarely operates alone. Researchers identified two modular backdoors deployed alongside the framework: HOLODONUT and MKDOOR. These modules extend PeckBirdy's attack capabilities beyond its core functionality, allowing attackers to maintain persistent access and exfiltrate sensitive data from compromised networks.

The modular architecture enables threat actors to customize their toolset based on target environments and operational requirements while keeping the core C2 framework lightweight and evasive.

Two Campaigns Identified

Trend Micro's investigation linked PeckBirdy to at least two specific campaigns targeting organizations in Asia.

The first campaign, tracked as SHADOW-VOID-044, utilized stolen code-signing certificates and standard Cobalt Strike payloads to breach targets. The attackers exploited CVE-2020-16040 and hosted malicious infrastructure across multiple domains to maintain resilience against takedowns.

The second campaign, SHADOW-EARTH-045, struck a Philippine educational institution in July 2024. Attackers executed an MSHTA command, a classic fileless technique, to connect to github[.]githubassets[.]net and launch PeckBirdy on a compromised IIS server. The use of GitHub-hosted infrastructure demonstrates the threat actors' efforts to blend malicious traffic with legitimate services.

Links to Known China-Aligned Groups

Researchers found tentative connections between these attacks and known China-aligned threat groups including Earth Lusca and Earth Baxia, though definitive attribution remains complex.

An IP address used in the Philippine attack, 47[.]238[.]184[.]9, had previously been linked to Earth Baxia operations. Earth Lusca has been active since at least 2021, targeting government organizations, educational institutions, and technology companies across Asia with espionage-focused campaigns.

The overlapping infrastructure and tactics suggest potential tool sharing or operational coordination among China-aligned APT groups, though the exact relationships between these threat actors remain unclear.

Recommendations

Organizations should monitor for suspicious Windows Script Host activity and MSHTA command execution, which are common indicators of fileless attack techniques. Security teams should implement behavioral detection capabilities that can identify malicious script execution patterns rather than relying solely on file-based signatures.

Network monitoring for connections to unexpected GitHub endpoints and other legitimate services that may be abused for C2 communication can help identify PeckBirdy and similar frameworks. Organizations in the government, education, and gambling sectors in Asia should be particularly vigilant given the observed targeting patterns.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire