Debut of China’s ‘Evasive Panda’ APT with High-End Cloud Hijacking

Published:

spot_img

China-sponsored Evasive Panda Introduces CloudScout Post-Compromise Toolset for Cloud Data Theft

The China-sponsored Evasive Panda hacking crew has introduced a new tool called CloudScout that is causing a stir in the cybersecurity world. This sleek and professional post-compromise toolset is designed to retrieve data from various cloud services using stolen web session cookies, according to researchers at ESET.

ESET uncovered CloudScout while investigating breaches in Taiwan, targeting a religious institution and a government entity. The tool is written in .NET and works seamlessly with MgBot, Evasive Panda’s proprietary malware framework. By using stolen cookies, CloudScout is able to access and infiltrate data from the cloud, targeting services like Google Drive, Gmail, and Outlook.

The sophistication of CloudScout showcases Evasive Panda’s technical capabilities and highlights the importance of cloud-stored documents, user profiles, and email in their espionage operations. The Chinese APT has been operating since at least 2012, focusing mainly on cyber espionage against civil society targets such as independence movements, religious and academic institutions, and supporters of democracy in China.

Evasive Panda has been known to consistently evolve its cyberattack techniques, with CloudScout being the latest iteration in their arsenal. By avoiding authentication checks like two-factor authentication and IP tracking, CloudScout is able to gather sensitive data and exfiltrate it using MgBot or another backdoor called Nightdoor.

Overall, the introduction of CloudScout by Evasive Panda demonstrates the group’s continued dedication to sophisticated cyber espionage operations, further solidifying their position as a significant threat in the cybersecurity landscape.

spot_img

Related articles

Recent articles

Unveiling Cyber Threats: APT Intrusions, AI Malware, Zero-Click Exploits, and Browser Hijacks

Jun 02, 2025Ravie LakshmananCybersecurity / Hacking News Imagine a security drill that spirals out of control—it would raise alarms, but in today’s cyber landscape, this...

Kuwait Set for Significant Borrowing Between 2025 and 2028

Kuwait's Growing Fiscal Challenges and Borrowing Needs Kuwait is anticipated to emerge as a significant borrower within the region in the coming years, primarily due...

Australians Fall Victim to $119 Million in Scams in Early 2025

Australians Lose Over $119 Million to Scams in Early 2025 A Shift in Reporting but Rising Financial Losses In the first four months of 2025, Australians...

1.7 Billion Stolen Passwords Now Up for Sale on the Dark Web

The infostealer malware threat has just grown dramatically. ...