Chinese Threat Actor CL-UNK-1068 Targets Asian Critical Infrastructure Across Seven Sectors in Years-Long Espionage Campaign
Palo Alto Networks Unit 42 has disclosed a years-long espionage campaign by a previously undocumented Chinese threat group designated CL-UNK-1068 targeting high-value organizations across seven critical infrastructure sectors in South, Southeast, and East Asia.
The campaign, assessed with moderate-to-high confidence as cyber espionage, targets aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications sectors using a versatile toolkit spanning both Windows and Linux environments.
Attack Methodology
CL-UNK-1068 gains initial access by exploiting web servers to deploy web shells, then moves laterally across victim networks using a combination of custom malware, modified open-source utilities, and living-off-the-land binaries (LOLBINs).
Typical attack chains proceed through:
- Web server exploitation — deploys Godzilla and ANTSWORD web shells for persistent command execution
- File harvesting — steals web server configuration files (
web.config,.aspx,.asmx,.asax,.dll) from IIS directories to discover credentials and vulnerabilities - Data collection — targets browser history and bookmarks, Excel and CSV files from desktops and user directories, and database backup files from MS-SQL servers
- Lateral movement — pivots through compromised networks using legitimate tools and custom scanners
Novel Exfiltration Technique
In cases where the web shell allowed command execution and output viewing but not direct file transfer, CL-UNK-1068 employed a creative workaround:
- Archive target files using WinRAR
- Base64-encode the archives using
certutil -encode - Print the encoded content to screen using the
typecommand through the web shell
This allowed the attackers to exfiltrate data as text output without ever uploading files — bypassing file transfer restrictions entirely.
Cross-Platform Toolkit
The group operates across Windows and Linux with tailored toolsets for each:
Web shells: Godzilla and ANTSWORD for persistent server access
Backdoors: Xnote — a Linux backdoor active since 2015, previously associated with Earth Berberoka (GamblingPuppet)
Tunneling: Fast Reverse Proxy (FRP) deployed via DLL sideloading through legitimate Python executables (python.exe, pythonw.exe) for persistent access
Scanning: ScanPortPlus — a custom Go-based network scanner for internal reconnaissance
Reconnaissance: SuperDump — a custom .NET tool used for host enumeration dating back to 2020, recently supplemented by batch scripts for host information collection and environment mapping
Privilege escalation: PrintSpoofer for Windows privilege escalation
Extensive Credential Theft Arsenal
CL-UNK-1068 deploys a wide range of credential harvesting tools:
- Mimikatz — dumps passwords from memory
- LsaRecorder — hooks
LsaApLogonUserEx2to capture WinLogon passwords in real time - DumpItForLinux + Volatility Framework — extracts password hashes from Linux memory
- SQL Server Management Studio Password Export Tool — extracts SSMS connection credentials from
sqlstudio.bin
The breadth of credential theft tooling — spanning Windows memory, Linux memory, live logon hooking, and database management credentials — indicates systematic efforts to gain the deepest possible access to victim environments.
Attribution Context
While formally designated as "unknown motivation," the targeting of critical infrastructure and government sectors combined with the focus on credential theft and sensitive data exfiltration strongly suggests espionage. The toolset shares overlaps with multiple Chinese hacking groups — Godzilla, ANTSWORD, Xnote, and FRP are all commonly used across China-nexus threat activity.
Unit 42 notes the group has maintained stealthy operations for years using primarily open-source tools and community-shared malware, demonstrating that sophisticated espionage campaigns don't require custom zero-days — just patience, persistence, and operational discipline.
Defender Recommendations
- Harden web servers — patch internet-facing web servers promptly and monitor for web shell deployment, particularly Godzilla and ANTSWORD indicators
- Monitor for certutil abuse — flag
certutil -encodeexecution followed bytypecommands as a potential exfiltration indicator - Detect DLL sideloading via Python — alert on
python.exeorpythonw.exeloading unsigned DLLs, particularly FRP components - Hunt for credential theft tools — monitor for Mimikatz, PrintSpoofer, and LsaRecorder artifacts across Windows endpoints
- Protect database credentials — audit access to
sqlstudio.binand restrict SQL Server Management Studio credential storage - Monitor Linux environments equally — CL-UNK-1068 operates across both OS families; ensure Linux servers receive the same threat hunting attention as Windows
- Audit IIS directories — watch for unauthorized access to
c:\inetpub\wwwrootand bulk reads of configuration files