China-Linked Cyber Espionage Campaign Hacks Over 1,000 SOHO Devices

Published:

spot_img

Unraveling the LapDogs Network: A New Era of Cyber Espionage

Date: June 27, 2025
Author: Ravie Lakshmanan
Tags: Threat Hunting / Vulnerability

Introduction to the LapDogs Network

Recent findings reveal an alarming trend in the realm of cybersecurity: a network of over 1,000 compromised small office and home office (SOHO) devices has been linked to extensive cyber espionage activities by hacking groups with ties to China. This network, dubbed LapDogs by SecurityScorecard’s STRIKE team, is raising concerns among experts due to its growing reach and sophistication.

Scope of Compromise

The LapDogs network shows a significant concentration of affected devices in the United States and Southeast Asia. The campaign has not only spread to these regions but has also impacted countries like Japan, South Korea, Hong Kong, and Taiwan. The sectors most affected include IT, networking, real estate, and media. Specifically, compromised devices span brands such as Ruckus Wireless, ASUS, Buffalo Technology, Cisco-Linksys, D-Link, Microsoft, Panasonic, and Synology, indicating a wide-ranging breach across notable manufacturers.

The Mechanics Behind LapDogs

At the core of the LapDogs network lies a custom-built backdoor known as ShortLeash. Designed to commandeer infected devices, ShortLeash sets up a deceptive Nginx web server and generates a unique self-signed TLS certificate that falsely presents as being issued by the Los Angeles Police Department. This clever branding tactic is what inspired the nickname for the network.

Delivery and Penetration

ShortLeash mainly infiltrates Linux-based SOHO devices through a shell script, but instances of a Windows version have also been identified. Initial access is executed via N-day security vulnerabilities, specifically targeting flaws like CVE-2015-1548 and CVE-2017-17663. The infiltration process appears to be systematic, with evidence of multiple attacks occurring in batches. The earliest recorded signs of the LapDogs activity date back to September 6, 2023, in Taiwan, followed by another incident on January 19, 2024. To date, a total of 162 distinct intrusion sets have been cataloged.

Similarities and Differences with PolarEdge

The operational framework of LapDogs shares certain traits with another organization called PolarEdge, which was noted for exploiting vulnerabilities in routers and IoT devices. Both networks reportedly use compromised devices, but they exhibit different infection methodologies and persistence tactics.

While PolarEdge often replaces the CGI script of affected devices with a designated web shell, ShortLeash establishes itself within system directories as a .service file, ensuring its persistence even after a reboot. This method allows it to operate with root-level privileges, thereby enhancing its control over the infected devices.

Possible Connections to UAT-5918

There are indications that the China-linked hacking group UAT-5918 might have utilized LapDogs in at least one operation aimed at Taiwan. The exact nature of their involvement remains unclear—whether they are the architects of this network or merely customers of its capabilities.

The Role of ORB Networks in Cyber Operations

Research from Google Mandiant, Sygnia, and SentinelOne highlights a broader trend in which Chinese threat actors are increasingly adopting ORB networks for their operations. Unlike typical botnets, which primarily consist of compromised devices, ORB networks like LapDogs serve a multifaceted role. They can assist throughout the intrusion lifecycle, from reconnaissance and anonymized browsing to netflow collection, vulnerability scanning, and data exfiltration.

Conclusion

As cyber threats evolve, recognizing the capabilities and mechanisms of networks like LapDogs becomes critical for cybersecurity professionals. Understanding these advanced tactics can help in developing comprehensive defense strategies to protect against such cyber espionage efforts in the future.

spot_img

Related articles

Recent articles

Raleigh, N.C., Strengthens City Operations with AI-Driven Technology Strategy

Raleigh, N.C., Strengthens City Operations with AI-Driven Technology Strategy Raleigh, North Carolina, is making significant strides in enhancing its municipal operations through a comprehensive technology...

China’s Control of North America’s Largest Antimony Mine Raises National Security Risks for Canada

China's Control of North America's Largest Antimony Mine Raises National Security Risks for Canada In the rugged interior of Newfoundland, approximately an hour's drive from...

Uganda Strengthens Agricultural Sector with National Feed and Fodder Data Dashboard Set for April Launch

Uganda Strengthens Agricultural Sector with National Feed and Fodder Data Dashboard Set for April Launch The Ministry of Agriculture, Animal Industry and Fisheries (MAAIF) of...

Pentagon Labels Anthropic a Supply Chain Risk as Palantir CEO Confirms Ongoing Use of Claude AI

Pentagon Labels Anthropic a Supply Chain Risk as Palantir CEO Confirms Ongoing Use of Claude AI Washington | The United States Department of Defense recently...