Researchers at Bitdefender have attributed a multi-wave cyber-espionage campaign targeting an oil and gas company in Azerbaijan to the China-linked APT group FamousSparrow (also known as Salt Typhoon and Earth Estries). The operation, which ran from late 2025 through February 2026, marks a strategic expansion of the group's targeting to the energy sector in the South Caucasus. The attackers gained initial access by exploiting Microsoft Exchange vulnerabilities, likely the ProxyNotShell chain, before deploying web shells and an updated version of the Deed RAT malware. The campaign showcases the group's evolving tradecraft, including advanced DLL sideloading and persistence techniques.
Threat Actor: FamousSparrow, a sophisticated Chinese APT group also tracked as Salt Typhoon and Earth Estries. This group has historically targeted government, hospitality, and industrial sectors worldwide.
Target: A major, unnamed oil and gas company in Azerbaijan. This represents a strategic shift in targeting, likely motivated by Azerbaijan's increasing role as an energy supplier to Europe, making its energy infrastructure a valuable intelligence target.
Attack Vector: The initial access was achieved by exploiting vulnerabilities in Microsoft Exchange, with high confidence it was the ProxyNotShell exploit chain (T1190 - Exploit Public-Facing Application). Following the breach, the attackers deployed web shells to establish a persistent foothold.
The attack chain demonstrates a focus on stealth and evasion:
Initial Access and Foothold: After exploiting Exchange, the attackers deployed web shells for initial command and control. This allows them to execute commands on the server and prepare for the next stage.
Evolved DLL Sideloading: FamousSparrow used an advanced DLL sideloading technique to evade automated analysis. They created a malicious library that overrode specific exported functions, creating a two-stage trigger. This gates the execution of the final payload, meaning it only runs under specific conditions, making it difficult to detonate in a sandbox.
Deed RAT Payload: The final payload was an updated variant of Deed RAT, a remote access trojan. To achieve persistence, the malware was hidden in a folder path designed to mimic a legitimate LogMeIn Hamachi installation (C:\Program Files (x86)\LogMeIn Hamachi\). This is an example of masquerading (T1036.005 - Masquerading: Match Legitimate Name or Location).
Lateral Movement and C2: Once the RAT was active, the attackers used the Remote Desktop Protocol (RDP) for lateral movement within the victim's network. The command-and-control (C2) infrastructure for this updated Deed RAT used the domain sentinelonepro[.]com over HTTPS on port 443, an attempt to blend in with legitimate security software traffic.
The compromise of a major energy company poses significant risks:
sentinelonepro[.]comHTTPS443Security teams can hunt for signs of a FamousSparrow attack with the following observables:
.aspx files in unusual directories).C:\Program Files (x86)\LogMeIn Hamachi\, especially if Hamachi is not used in your environment.sentinelonepro[.]com domain. Be suspicious of any traffic to domains that impersonate security vendors.Immediately patch public-facing applications like Microsoft Exchange to prevent initial access.
Use application control to prevent the execution of unauthorized web shells and malware.
Restrict RDP and other management protocols between network segments to limit an attacker's ability to move laterally.
Start of the multi-wave espionage campaign against the Azerbaijani oil and gas company.
The campaign is observed to be active through at least February 2026.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.