Security researchers have identified a new advanced persistent threat (APT) cluster, named Amaranth-Dragon, linked to a series of sophisticated cyber espionage attacks. The group, which shows operational and tooling overlaps with the notorious Chinese threat actor APT41, has been targeting government and law enforcement entities across Southeast Asia since 2025. Amaranth-Dragon has shown agility by weaponizing CVE-2025-8088, a critical WinRAR vulnerability, just days after its public disclosure. The group employs a custom toolkit, including the Amaranth Loader and a new TGAmaranth RAT, which uses Telegram for C2, to maintain stealth and exfiltrate data. The attacks are highly targeted and appear to align with China's geopolitical interests in the region.
Amaranth-Dragon is a focused espionage group with a clear mission: to gather intelligence from government and law enforcement agencies in Southeast Asia. Targeted countries include Cambodia, Thailand, Laos, Indonesia, Singapore, and the Philippines. The timing of their attacks often correlates with sensitive political events in these nations, reinforcing the assessment of a state-sponsored intelligence-gathering motive.
The group's primary initial access vector is the exploitation of CVE-2025-8088, a vulnerability in the popular WinRAR file archiving utility. The attackers craft malicious RAR archives that, when opened by a victim, execute arbitrary code. This demonstrates the group's ability to quickly operationalize publicly disclosed vulnerabilities.
Amaranth-Dragon's attack chain is designed for stealth and persistence.
Amaranth Loader, a custom tool responsible for delivering the main implant. It uses encryption to hide the final payload and employs techniques to evade detection.Attribution to a China-based actor is supported by the group's operational hours (aligning with UTC+8), file compilation times, and overlaps with tools and infrastructure used by the broader APT41 nexus.
T1566.001 - Phishing: Spearphishing Attachment: Likely delivery method for the malicious RAR archive.T1190 - Exploit Public-Facing Application: Exploitation of the CVE-2025-8088 WinRAR vulnerability.T1071.001 - Application Layer Protocol: Web Protocols: Use of the Telegram API over HTTPS for C2.T1140 - Deobfuscate/Decode Files or Information: The Amaranth Loader decrypts the final payload.T1562.001 - Impair Defenses: Disable or Modify Tools: The TGAmaranth RAT includes anti-EDR/AV capabilities.T1219 - Remote Access Software: Use of the Havoc C2 framework.The Amaranth-Dragon campaign poses a significant threat to the national security and political stability of the targeted Southeast Asian nations. By compromising government and law enforcement agencies, the threat actor can gain access to sensitive diplomatic strategies, law enforcement intelligence, and citizen data. This intelligence can provide a strategic advantage to the sponsoring state (presumed to be China) in regional negotiations and foreign policy. The use of custom, stealthy tools indicates a long-term commitment to maintaining access and exfiltrating data from these high-value networks.
| Type | Value | Description |
|---|---|---|
url_pattern |
api.telegram.org/bot* |
Monitor for network traffic to the Telegram Bot API from servers and workstations that should not be using it. |
process_name |
WinRAR.exe |
Monitor for WinRAR spawning unusual child processes, such as cmd.exe or powershell.exe. |
log_source |
Cloudflare Logs |
If available, analyze logs for connections from your network to infrastructure protected by Cloudflare that matches known IOCs for this group. |
D3-NTA: Network Traffic Analysis. Specifically, monitor for and alert on outbound connections to api.telegram.org. While Telegram is a legitimate application, its use for C2 from government servers is highly anomalous and a strong indicator of compromise.Amaranth Loader or TGAmaranth RAT artifacts. Use D3-PA: Process Analysis to identify suspicious parent-child process relationships.D3-SU: Software Update.api.telegram.org) and other unauthorized messaging or cloud services from all corporate servers and sensitive workstations. This aligns with D3-OTF: Outbound Traffic Filtering.Patching WinRAR to fix CVE-2025-8088 is the most effective way to prevent this initial access vector.
Mapped D3FEND Techniques:
Block outbound connections to the Telegram API and other non-essential web services from corporate servers.
Mapped D3FEND Techniques:
Use EDR solutions to detect and block the suspicious behaviors of the custom loaders and RATs.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats