Chinese APT FamousSparrow Targets Azerbaijan Energy Sector with Deed RAT

Chinese APT FamousSparrow Hits Azerbaijan Energy Sector with Deed RAT

HIGH
May 15, 2026
5m read
Threat ActorCyberattackIndustrial Control Systems

Related Entities

Threat Actors

FamousSparrowSalt TyphoonEarth Estries

Organizations

Bitdefender

Products & Tech

Microsoft Exchange LogMeIn Hamachi

Other

Deed RATProxyNotShell

Full Report

Executive Summary

Researchers at Bitdefender have attributed a multi-wave cyber-espionage campaign targeting an oil and gas company in Azerbaijan to the China-linked APT group FamousSparrow (also known as Salt Typhoon and Earth Estries). The operation, which ran from late 2025 through February 2026, marks a strategic expansion of the group's targeting to the energy sector in the South Caucasus. The attackers gained initial access by exploiting Microsoft Exchange vulnerabilities, likely the ProxyNotShell chain, before deploying web shells and an updated version of the Deed RAT malware. The campaign showcases the group's evolving tradecraft, including advanced DLL sideloading and persistence techniques.


Threat Overview

Threat Actor: FamousSparrow, a sophisticated Chinese APT group also tracked as Salt Typhoon and Earth Estries. This group has historically targeted government, hospitality, and industrial sectors worldwide.

Target: A major, unnamed oil and gas company in Azerbaijan. This represents a strategic shift in targeting, likely motivated by Azerbaijan's increasing role as an energy supplier to Europe, making its energy infrastructure a valuable intelligence target.

Attack Vector: The initial access was achieved by exploiting vulnerabilities in Microsoft Exchange, with high confidence it was the ProxyNotShell exploit chain (T1190 - Exploit Public-Facing Application). Following the breach, the attackers deployed web shells to establish a persistent foothold.


Technical Analysis

The attack chain demonstrates a focus on stealth and evasion:

  1. Initial Access and Foothold: After exploiting Exchange, the attackers deployed web shells for initial command and control. This allows them to execute commands on the server and prepare for the next stage.

  2. Evolved DLL Sideloading: FamousSparrow used an advanced DLL sideloading technique to evade automated analysis. They created a malicious library that overrode specific exported functions, creating a two-stage trigger. This gates the execution of the final payload, meaning it only runs under specific conditions, making it difficult to detonate in a sandbox.

  3. Deed RAT Payload: The final payload was an updated variant of Deed RAT, a remote access trojan. To achieve persistence, the malware was hidden in a folder path designed to mimic a legitimate LogMeIn Hamachi installation (C:\Program Files (x86)\LogMeIn Hamachi\). This is an example of masquerading (T1036.005 - Masquerading: Match Legitimate Name or Location).

  4. Lateral Movement and C2: Once the RAT was active, the attackers used the Remote Desktop Protocol (RDP) for lateral movement within the victim's network. The command-and-control (C2) infrastructure for this updated Deed RAT used the domain sentinelonepro[.]com over HTTPS on port 443, an attempt to blend in with legitimate security software traffic.


Impact Assessment

The compromise of a major energy company poses significant risks:

  • Espionage: The primary goal is likely the theft of sensitive information related to energy production, exploration data, pricing strategies, and contracts with European partners. This intelligence would be highly valuable to the Chinese state.
  • Disruption Potential: While this campaign appears focused on espionage, the access gained could be leveraged in the future to disrupt energy operations, causing economic and political instability.
  • Supply Chain Risk: Gaining access to the network of a major oil and gas provider could allow attackers to pivot to partners, customers, or suppliers, creating a broader supply chain compromise.

IOCs — Directly from Articles

Type
Domain
Value
sentinelonepro[.]com
Description
C2 domain used by the updated Deed RAT, masquerading as a security vendor.
Type
Protocol
Value
HTTPS
Description
C2 communication protocol.
Type
Port
Value
443
Description
C2 communication port.

Cyber Observables — Hunting Hints

Security teams can hunt for signs of a FamousSparrow attack with the following observables:

  • Exchange Server Logs: Review IIS and Exchange logs for signs of ProxyNotShell exploitation or the presence of suspicious web shell files (e.g., .aspx files in unusual directories).
  • File System: Look for suspicious folder paths mimicking legitimate software, such as C:\Program Files (x86)\LogMeIn Hamachi\, especially if Hamachi is not used in your environment.
  • Network Traffic: Monitor for and block outbound connections to the sentinelonepro[.]com domain. Be suspicious of any traffic to domains that impersonate security vendors.
  • Process Monitoring: Watch for legitimate processes loading DLLs from non-standard paths, a key indicator of DLL sideloading.

Detection & Response

  • Patch Management: Aggressively patch all internet-facing systems, especially Microsoft Exchange, to prevent initial access.
  • EDR and Behavioral Analysis: Deploy an EDR solution to detect the TTPs used by FamousSparrow, such as DLL sideloading, masquerading, and the use of RDP for lateral movement.
  • Network Egress Filtering: Block outbound connections to known malicious domains and monitor for suspicious HTTPS traffic to uncategorized or impersonation domains.

Mitigation

  • Harden Exchange Servers: Beyond patching, follow Microsoft's best practices for securing Exchange servers, including restricting external access to management interfaces.
  • Application Control: Use application allowlisting to prevent the execution of unauthorized executables and the loading of malicious DLLs.
  • Principle of Least Privilege: Limit user and service account permissions to prevent attackers from easily moving laterally with RDP after an initial compromise.

Timeline of Events

1
December 1, 2025
Start of the multi-wave espionage campaign against the Azerbaijani oil and gas company.
2
February 1, 2026
The campaign is observed to be active through at least February 2026.
3
May 15, 2026
This article was published

MITRE ATT&CK Mitigations

Immediately patch public-facing applications like Microsoft Exchange to prevent initial access.

Use application control to prevent the execution of unauthorized web shells and malware.

Restrict RDP and other management protocols between network segments to limit an attacker's ability to move laterally.

Timeline of Events

1
December 1, 2025

Start of the multi-wave espionage campaign against the Azerbaijani oil and gas company.

2
February 1, 2026

The campaign is observed to be active through at least February 2026.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

FamousSparrowAPTChinaAzerbaijanEnergy SectorDeed RATExchangeEspionage

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.