Military personnel in Southeast Asian countries
Security researchers from Palo Alto Networks Unit 42 have uncovered a protracted cyber espionage campaign targeting military organizations across Southeast Asia. The operation, attributed to a suspected China-based advanced persistent threat (APT) group tracked as CL-STA-1087, has been ongoing since at least 2020. The attackers employ a custom toolkit, including two backdoors known as AppleChris and MemFun, and a credential harvesting tool named Getpass. The campaign is characterized by its strategic patience and highly specific intelligence objectives, focusing on the exfiltration of documents detailing military capabilities, command structures, and partnerships with Western nations. This indicates a state-sponsored intelligence operation aimed at gaining strategic military and geopolitical advantages in the region.
The threat actor CL-STA-1087 is engaged in a classic espionage campaign designed for long-term access and targeted data theft. Unlike financially motivated attacks, this operation is focused on acquiring specific intelligence. The targets are military entities in Southeast Asia, a region of significant geopolitical interest. The attackers' primary goal is to steal documents that provide insight into the victims' military readiness, technological capabilities, and alliances. The use of custom malware and defense evasion techniques suggests a well-resourced and skilled adversary. While the initial access vector is currently unknown, the group's actions post-compromise—including careful lateral movement and deployment of multiple backdoors—point to a deliberate and methodical approach to maintaining access and achieving their objectives.
While the initial point of entry has not been identified, the post-exploitation TTPs provide significant insight into the group's methods:
T1059.001 - PowerShell to execute commands. A notable technique was a six-hour sleep command (Start-Sleep -Seconds 21600) before execution, a form of T1497.003 - Time Based Evasion to bypass sandbox analysis.T1090.002 - External Proxy or a custom C2 protocol over standard ports.T1027 - Obfuscated Files or Information), as these tools will not be detected by standard antivirus signatures.T1003 - OS Credential Dumping or T1555 - Credentials from Password Stores.T1021 - Remote Services) to expand their foothold within the compromised network and ensure redundant access points.T1005 - Data from Local System) and exfiltration over their C2 channel (T1041 - Exfiltration Over C2 Channel).The strategic impact of this campaign is significant. The theft of sensitive military documents can provide an adversary with critical intelligence on a nation's defense posture, operational plans, and technological gaps. This information could be used to:
For the targeted organizations, this represents a major breach of national security, undermining their defense capabilities and potentially exposing personnel and assets to risk.
No specific domains, IPs, or hashes were provided in the source material. The primary indicators are behavioral.
| Type | Value | Description |
|---|---|---|
| Malware Family | AppleChris | Custom backdoor used for persistence and C2. |
| Malware Family | MemFun | Custom backdoor used for persistence and C2. |
| Tool | Getpass | Custom credential harvesting tool. |
| TTP | PowerShell with long sleep timers | Used for defense evasion and delayed execution. |
D3-UBA - User Behavior Analysis.RemoteSigned or more restrictive and disable it for users who do not need it. This is part of M1038 - Execution Prevention.M1030 - Network Segmentation) to prevent attackers from moving laterally from less sensitive parts of the network to classified systems.M1026 - Privileged Account Management). Ensure user accounts only have access to the data and systems necessary for their roles.Use application control to restrict the use of PowerShell and other scripting languages to only authorized users and scripts.
Mapped D3FEND Techniques:
Enable comprehensive logging, especially for PowerShell and command-line activity, and centralize logs for analysis and threat hunting.
Isolate critical military and intelligence systems from general-purpose networks to contain breaches and prevent lateral movement.
Strictly control and monitor the use of privileged accounts to limit an attacker's ability to harvest credentials and move laterally.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats