Security researchers at Symantec have uncovered a prolonged cyber-espionage campaign by the Chinese APT group Jewelbug (also tracked as Earth Alux) targeting a Russian IT service provider. The intrusion, which lasted five months from January to May 2025, is notable as it demonstrates Chinese state-sponsored actors targeting entities within Russia, a strategic partner. The attackers gained deep access into the victim's network, including code repositories and software build systems, presenting a credible threat of a software supply chain compromise. The group employed sophisticated tools, including the ShadowPad backdoor, and used the legitimate Russian cloud service Yandex Cloud for data exfiltration to blend in with normal network activity.
The Jewelbug APT group, known for targeting government and corporate entities in South and Southeast Asia and South America, has expanded its geographical focus to include Russia. The primary target was an unnamed Russian IT service provider, whose compromise could serve as a stepping stone to attack its customer base across Russia. The five-month dwell time provided the attackers with ample opportunity to explore the network, identify high-value assets, and exfiltrate data.
The most alarming aspect of the intrusion was the attackers' access to the firm's software build environment. This could have allowed them to inject malicious code into the provider's legitimate software, creating a widespread supply chain attack similar to the SolarWinds incident.
Symantec's investigation revealed a multi-stage attack leveraging both custom malware and legitimate tools:
cdb.exe) to load and execute malicious shellcode. This is a known application allowlisting bypass technique, falling under T1218 - System Binary Proxy Execution.T1574.002 - DLL Side-Loading) to load their malware stealthily.T1567.002 - Exfiltration to Cloud Storage, is designed to make malicious traffic indistinguishable from legitimate cloud service usage, thereby evading network-based security controls.The group's evolving capabilities were further highlighted in a separate July 2025 campaign against a South American government, where they deployed a new, previously unseen backdoor.
A successful compromise of a software provider's build environment is one of the most impactful types of cyberattacks. Had Jewelbug successfully injected malicious code into the Russian IT firm's software, the potential consequences could include:
Even without a confirmed supply chain compromise, the exfiltration of source code grants the attackers significant intelligence for finding and exploiting future vulnerabilities in the provider's software.
This attack serves as a stark reminder that geopolitical alliances do not equate to immunity from cyber-espionage. All organizations, regardless of location, are potential targets for sophisticated state-sponsored actors.
Security teams should hunt for the following TTPs:
| Type | Value | Description |
|---|---|---|
| process_name | cdb.exe |
Monitor for execution of the Microsoft Console Debugger, especially if it is renamed or running from an unusual directory. |
| network_traffic_pattern | *.storage.yandexcloud.net |
Unusual or large data uploads to Yandex Cloud from sensitive systems like build servers or developer workstations. |
| file_name | Secur32.dll |
ShadowPad is known to use this and other legitimate-sounding DLL names for its components. Monitor for these files in non-standard locations. |
| command_line_pattern | rundll32.exe <malicious_dll>,<export_function> |
A common pattern for executing malware modules via DLL side-loading or direct invocation. |
cdb.exe) executing shellcode or unexpected network connections to cloud storage providers. Use D3FEND's D3-PA: Process Analysis.D3-OTF: Outbound Traffic Filtering.D3-NI: Network Isolation.D3-EAL: Executable Allowlisting.Prevent the execution of unauthorized binaries like renamed debuggers by implementing application control policies.
Mapped D3FEND Techniques:
Implement strict egress filtering to block or alert on outbound connections to unauthorized cloud services like Yandex Cloud.
Mapped D3FEND Techniques:
Enable comprehensive logging for build servers and code repositories to detect anomalous access patterns and data movement.
Mapped D3FEND Techniques:
Isolate the software build environment from the rest of the corporate network to prevent lateral movement and contain potential breaches.
Mapped D3FEND Techniques:
To counter the exfiltration technique used by Jewelbug, organizations must implement strict outbound traffic filtering and analysis, especially from critical assets like software build servers. The default policy should be to deny all outbound connections. Explicit allow rules should be created only for necessary and vetted destinations. Specifically, traffic to unapproved cloud storage providers like Yandex Cloud should be blocked. For sanctioned cloud services, monitor for anomalous data volumes or traffic patterns that deviate from the established baseline. This proactive filtering makes it significantly harder for attackers to exfiltrate stolen data, forcing them to use noisier channels that are easier to detect.
Deploy an EDR solution capable of deep process analysis on all developer workstations and build servers. This is crucial for detecting the abuse of legitimate system binaries like cdb.exe. The EDR should be configured to alert on suspicious process chains, such as cdb.exe being launched by an Office application or spawning network connections. Furthermore, monitor for DLL side-loading by creating rules that detect when a legitimate, signed executable loads a DLL from a non-standard or user-writable directory. Analyzing the behavior and context of process execution, rather than just the process name, is essential for uncovering the stealthy techniques employed by APTs like Jewelbug.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats