Chinese APT24 Group Uses 'BadAudio' Malware in Years-Long Espionage Campaign Targeting Taiwan

APT24 (Pitty Tiger) Deploys Custom 'BadAudio' Malware in Sophisticated Cyberespionage Campaign

HIGH
November 22, 2025
6m read
Threat ActorMalwareSupply Chain Attack

Related Entities

Threat Actors

APT24 Pitty Tiger

Organizations

Google Threat Intelligence Group (GTIG)Microsoft

Other

Full Report

Executive Summary

Google Threat Intelligence Group (GTIG) has uncovered a long-running cyberespionage campaign, active since at least November 2022, conducted by the China-linked threat actor APT24 (also known as Pitty Tiger). The campaign's primary objective is intelligence gathering, with a strong focus on targets in Taiwan. A key component of this operation is a previously undocumented custom malware downloader named BadAudio. This malware is a highly obfuscated first-stage payload designed to establish a foothold on victim systems before delivering more powerful tools like Cobalt Strike. APT24 has demonstrated significant operational evolution, shifting from broad watering hole attacks to more targeted supply chain compromises and spear-phishing, indicating a persistent and sophisticated adversary focused on long-term intelligence collection.


Threat Overview

APT24 is a state-sponsored threat group with a history of targeting organizations for intellectual property theft, active since at least 2008. This latest campaign showcases their continued investment in custom tooling and adaptive tactics. The operation has progressed through several phases:

  • Initial Phase (Nov 2022 onwards): The group compromised over 20 legitimate websites, injecting malicious JavaScript to perform visitor fingerprinting. Select Windows users were then served fake software update pop-ups, tricking them into downloading the BadAudio malware.
  • Supply Chain Attack (July 2024): APT24 escalated its tactics by compromising a Taiwanese digital marketing firm. This allowed them to potentially infect over 1,000 downstream domains that utilized the firm's scripts, significantly broadening their reach.
  • Spear-Phishing (Aug 2024 onwards): The group adopted more targeted spear-phishing emails, using lures related to animal rescue organizations. These emails contained links to encrypted archives hosted on legitimate cloud services like Google Drive and Microsoft OneDrive, which contained the BadAudio payload.

Technical Analysis

BadAudio Malware

BadAudio is a first-stage downloader written in C++ and serves as the initial entry point into a victim's network. Its primary features are geared towards stealth and evasion:

  • Delivery and Execution: It is typically delivered as a malicious DLL file. It gains execution through T1574.001 - Hijack Execution Flow: DLL Search Order Hijacking, where a legitimate application is tricked into loading the malicious DLL instead of a legitimate one.
  • Obfuscation: The malware employs control flow flattening, a sophisticated obfuscation technique that obscures the program's logic, making static analysis and reverse engineering extremely difficult.
  • C2 Communication: Upon execution, BadAudio gathers basic system information (e.g., hostname, OS version). This data is encrypted using a hard-coded AES key and sent to a command-and-control (C2) server within an HTTP cookie.
  • Payload Deployment: The C2 server responds with a second-stage payload, such as a Cobalt Strike Beacon. This payload is encrypted with the same AES key, decrypted by BadAudio, and then executed directly in memory. This fileless execution helps evade detection by traditional antivirus software.

MITRE ATT&CK Techniques

Impact Assessment

The campaign's primary goal is cyberespionage. By targeting sectors like government, healthcare, telecommunications, and construction, APT24 seeks to steal valuable intellectual property, government secrets, and other sensitive data that align with the strategic interests of the Chinese state. The compromise of a digital marketing firm represents a significant supply chain risk, exposing a large number of downstream organizations to infection. For targeted organizations in Taiwan, this long-term, persistent intrusion could lead to a substantial loss of sensitive national and commercial information.

IOCs

No specific file hashes or C2 domains were provided in the source articles.

Cyber Observables for Detection

Type Value Description Context Confidence
file_name *.dll Monitor for newly dropped DLLs in directories where legitimate applications load their libraries. File Integrity Monitoring, EDR medium
command_line_pattern rundll32.exe <suspicious.dll>,<export_name> A common method for executing malicious DLLs. Look for executions of unsigned or untrusted DLLs. EDR, Windows Event ID 4688, Sysmon Event ID 1 medium
network_traffic_pattern HTTP requests with encrypted data in cookies Unusual or large amounts of data being sent in HTTP cookie headers could indicate BadAudio C2 communication. Network Security Monitoring, IDS/IPS medium
process_name [legitimate_process.exe] Monitor legitimate processes for suspicious network connections or for loading unsigned DLLs from non-standard paths. EDR, Process Monitoring high

Detection & Response

Detecting BadAudio requires a defense-in-depth strategy that combines network and endpoint monitoring.

  1. Endpoint Detection (EDR): An EDR solution is critical for detecting techniques like DLL search-order hijacking. Configure EDR to alert on legitimate processes loading unsigned or newly created DLLs. Memory scanning can also detect the in-memory execution of payloads like Cobalt Strike. This is an application of D3-PA: Process Analysis.

  2. Network Monitoring: Analyze outbound HTTP traffic for anomalies. Since BadAudio uses cookies for C2, look for POST requests with unusually large or encrypted cookie values. Decrypting SSL/TLS traffic is essential for this analysis. This aligns with D3-NTA: Network Traffic Analysis.

  3. Threat Hunting: Proactively hunt for signs of DLL hijacking. Query systems for applications that have DLLs with the same name in both the application directory and a system directory (e.g., System32), as this is a common condition for hijacking.

Mitigation

Defending against a sophisticated actor like APT24 requires robust security hygiene and advanced controls.

  • Application Control: Implement application control solutions, such as Windows Defender Application Control, to restrict the execution of unauthorized DLLs. This directly counters DLL hijacking and is a form of D3-EAL: Executable Allowlisting.
  • Attack Surface Reduction (ASR): Enable ASR rules on Windows endpoints, particularly rules that block processes created by Office macros, script execution, and untrusted executables.
  • User Training: Train users to be suspicious of unsolicited software update pop-ups and to only download software from official sources. This helps mitigate the watering hole and phishing vectors.
  • Supply Chain Security: For organizations using third-party scripts or services on their websites, implement Subresource Integrity (SRI) to ensure that the scripts have not been tampered with. This is a specific form of D3-ACH: Application Configuration Hardening.

Timeline of Events

1
November 1, 2022
APT24's campaign featuring BadAudio is first observed, using watering hole attacks.
2
July 1, 2024
The group compromises a Taiwanese digital marketing firm in a supply chain attack.
3
August 1, 2024
APT24 begins using spear-phishing campaigns to deliver the BadAudio malware.
4
November 22, 2025
This article was published

MITRE ATT&CK Mitigations

Use application control to prevent the loading of unauthorized or unsigned DLLs, which would block the DLL search order hijacking technique.

Mapped D3FEND Techniques:

Use web filtering and SSL/TLS inspection to block connections to known malicious domains and detect anomalous C2 traffic.

Educate users to recognize and report suspicious pop-ups and phishing attempts.

D3FEND Defensive Countermeasures

To directly counter the core execution method of the BadAudio malware, organizations should implement robust executable allowlisting, with a specific focus on DLLs. Using technologies like Windows Defender Application Control (WDAC), security teams can create policies that only permit known, signed, and trusted DLLs to be loaded by applications. This fundamentally breaks the DLL search order hijacking technique (T1574.001) used by APT24, as the operating system would prevent the legitimate application from loading the malicious BadAudio DLL. The policy should be configured in enforcement mode, starting with critical systems and servers, and then gradually rolled out to workstations. While this requires a significant initial investment in baselining and policy creation, it is one of the most effective controls against this class of malware.

For detection of BadAudio and its second-stage payloads like Cobalt Strike, continuous process analysis on endpoints is essential. Security teams must leverage an EDR solution to monitor for anomalous process behaviors. Specifically for this threat, configure detection rules for: 1) Legitimate, signed processes (e.g., explorer.exe) loading unsigned DLLs from non-standard directories. 2) A process establishing a network connection with high-entropy data in the HTTP cookie header, which is characteristic of BadAudio's C2. 3) In-memory injection of threads into other processes, a hallmark of Cobalt Strike's beacon. By establishing a baseline of normal process activity and alerting on these specific deviations, security teams can detect the infection chain even if the initial malware files are heavily obfuscated.

Sources & References

APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
The Hacker News (thehackernews.com) November 21, 2025
Chinese Cyberspies Deploy 'BadAudio' Malware via Supply Chain Attacks
SecurityWeek (securityweek.com) November 21, 2025
Novel BadAudio malware leveraged in years-long APT24 campaign
SC Media (scmagazine.com) November 21, 2025
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
Security Affairs (securityaffairs.com) November 22, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APT24Pitty TigerBadAudioCyber EspionageMalwareSupply Chain AttackTaiwanCobalt Strike

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading