China-Linked Cyber Espionage Campaign Hacks Over 1,000 SOHO Devices

Published:

spot_img

Unraveling the LapDogs Network: A New Era of Cyber Espionage

Date: June 27, 2025
Author: Ravie Lakshmanan
Tags: Threat Hunting / Vulnerability

Introduction to the LapDogs Network

Recent findings reveal an alarming trend in the realm of cybersecurity: a network of over 1,000 compromised small office and home office (SOHO) devices has been linked to extensive cyber espionage activities by hacking groups with ties to China. This network, dubbed LapDogs by SecurityScorecard’s STRIKE team, is raising concerns among experts due to its growing reach and sophistication.

Scope of Compromise

The LapDogs network shows a significant concentration of affected devices in the United States and Southeast Asia. The campaign has not only spread to these regions but has also impacted countries like Japan, South Korea, Hong Kong, and Taiwan. The sectors most affected include IT, networking, real estate, and media. Specifically, compromised devices span brands such as Ruckus Wireless, ASUS, Buffalo Technology, Cisco-Linksys, D-Link, Microsoft, Panasonic, and Synology, indicating a wide-ranging breach across notable manufacturers.

The Mechanics Behind LapDogs

At the core of the LapDogs network lies a custom-built backdoor known as ShortLeash. Designed to commandeer infected devices, ShortLeash sets up a deceptive Nginx web server and generates a unique self-signed TLS certificate that falsely presents as being issued by the Los Angeles Police Department. This clever branding tactic is what inspired the nickname for the network.

Delivery and Penetration

ShortLeash mainly infiltrates Linux-based SOHO devices through a shell script, but instances of a Windows version have also been identified. Initial access is executed via N-day security vulnerabilities, specifically targeting flaws like CVE-2015-1548 and CVE-2017-17663. The infiltration process appears to be systematic, with evidence of multiple attacks occurring in batches. The earliest recorded signs of the LapDogs activity date back to September 6, 2023, in Taiwan, followed by another incident on January 19, 2024. To date, a total of 162 distinct intrusion sets have been cataloged.

Similarities and Differences with PolarEdge

The operational framework of LapDogs shares certain traits with another organization called PolarEdge, which was noted for exploiting vulnerabilities in routers and IoT devices. Both networks reportedly use compromised devices, but they exhibit different infection methodologies and persistence tactics.

While PolarEdge often replaces the CGI script of affected devices with a designated web shell, ShortLeash establishes itself within system directories as a .service file, ensuring its persistence even after a reboot. This method allows it to operate with root-level privileges, thereby enhancing its control over the infected devices.

Possible Connections to UAT-5918

There are indications that the China-linked hacking group UAT-5918 might have utilized LapDogs in at least one operation aimed at Taiwan. The exact nature of their involvement remains unclear—whether they are the architects of this network or merely customers of its capabilities.

The Role of ORB Networks in Cyber Operations

Research from Google Mandiant, Sygnia, and SentinelOne highlights a broader trend in which Chinese threat actors are increasingly adopting ORB networks for their operations. Unlike typical botnets, which primarily consist of compromised devices, ORB networks like LapDogs serve a multifaceted role. They can assist throughout the intrusion lifecycle, from reconnaissance and anonymized browsing to netflow collection, vulnerability scanning, and data exfiltration.

Conclusion

As cyber threats evolve, recognizing the capabilities and mechanisms of networks like LapDogs becomes critical for cybersecurity professionals. Understanding these advanced tactics can help in developing comprehensive defense strategies to protect against such cyber espionage efforts in the future.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...