In its April 2024 APT Activity Report, ESET researchers revealed a significant evolution in the targeting strategy of MirrorFace, a China-aligned advanced persistent threat (APT) group. The group, which has historically concentrated its espionage efforts on targets in Japan, was observed attacking a diplomatic organization in the European Union. This expansion of operations indicates a shift in the intelligence-gathering priorities of the group's sponsors. The attack highlights the persistent and evolving threat that nation-state actors pose to diplomatic and governmental bodies worldwide. ESET also noted a broader trend among Chinese APTs of leveraging the legitimate, open-source SoftEther VPN tool to maintain stealthy, persistent access to compromised networks.
MirrorFace is a sophisticated threat actor focused on cyber-espionage. Their campaigns are characterized by the use of custom malware, spear-phishing for initial access, and a focus on long-term intelligence gathering. The shift to targeting an EU diplomatic entity suggests that the group's mission has expanded to include gathering political and economic intelligence related to European affairs. This development is a direct threat to EU member states and their diplomatic missions globally.
While the specific infection vector for the EU attack was not detailed, MirrorFace campaigns typically involve:
T1566.001 - Phishing: Spearphishing Attachment: A likely initial access vector.T1204.002 - User Execution: Malicious File: The victim is tricked into opening the malicious document.T1572 - Protocol Tunneling: The use of SoftEther VPN to tunnel C2 traffic.T1071.001 - Application Layer Protocol: Web Protocols: The C2 traffic is often disguised as normal HTTPS traffic.T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys: A common method for malware persistence.The expansion of MirrorFace's targeting has significant geopolitical and security implications:
No specific Indicators of Compromise (IOCs) were provided in the source articles.
To hunt for MirrorFace and similar APT activity:
sevpn.exe or sevpnclient.exeUsing application allowlisting to prevent the execution of unauthorized tools like SoftEther VPN can block this persistence and C2 technique.
Implementing strict egress filtering to block outbound connections on common VPN ports to non-approved destinations can disrupt C2 channels.
Mapped D3FEND Techniques:
Ongoing user training on how to spot and report spear-phishing emails is a critical defense against the initial access vector.
To counter the tactic of using legitimate tools like SoftEther VPN for malicious purposes, diplomatic and government organizations should implement strict application allowlisting. This approach shifts from a reactive blocklist model to a proactive one where only explicitly approved applications are allowed to run. For an organization targeted by MirrorFace, a policy would be created that does not include sevpnclient.exe or other components of SoftEther VPN. When the attacker attempts to install or run the tool post-compromise, the operating system will block the execution. This mitigation effectively neutralizes the attacker's ability to use this specific 'living off the land' technique for persistence and C2, forcing them to use other, potentially noisier methods that are easier to detect.
To disrupt the C2 tunneling used by MirrorFace, organizations must implement stringent outbound traffic filtering at the network perimeter. The default policy should be to deny all outbound traffic. Specific, narrowly-defined rules should then be created to allow only essential traffic. For example, allow outbound HTTPS only through an inspecting proxy and block direct connections. For VPNs, only allow connections to a small, explicitly defined list of corporate-sanctioned VPN provider IPs. Any attempt to establish a persistent, encrypted connection to an unknown IP, as would be the case with a malicious SoftEther VPN C2 server, would be blocked and should trigger a high-priority alert. This containment strategy is crucial for preventing an attacker from maintaining control over a compromised host.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats