Home OSINT News Signals
CYBER

Operation "Soft Cell" Revisited: China-Nexus Espionage Group Maintains Decade-Long Presence in Southeast Asian Defense Networks

🕓 1 min read

A sophisticated and persistent cyberespionage campaign, linked to Chinese state-sponsored actors, has been discovered operating within the networks of multiple Southeast Asian military and governmental organizations for nearly a decade. Security researchers from SentinelOne's SentinelLabs detailed the operation, which exhibits a high degree of operational security and technical evolution. The threat actors, tracked under the cluster name "Stately Taurus" (with overlaps to groups known as Camaro Dragon or Earth Lusca), have consistently targeted high-value entities involved in maritime sovereignty and territorial disputes in the South China Sea. Their primary objective is the long-term, stealthy exfiltration of sensitive geopolitical intelligence.

The campaign's longevity is enabled by a constantly evolving toolkit that blends custom, novel malware with refined versions of known tools. A key discovery is a previously undocumented backdoor dubbed "SpinyRegressor," a sophisticated C++ implant deployed as a Windows Registry value to maintain persistence. It communicates with command-and-control (C2) servers using encrypted TCP sockets and employs a unique "fileless" execution method that leaves minimal forensic traces. Alongside this new tool, the group continues to utilize updated variants of known backdoors like "WinDealer" and "DownPaper," demonstrating a commitment to both innovation and the reliable reuse of effective code.

Evasion and operational security are hallmarks of this campaign. The actors meticulously tailor their phishing lures to their targets, using documents related to regional naval exercises, military partnerships, and geopolitical conferences. They leverage stolen code-signing certificates to sign their malware, lending it an air of legitimacy to bypass security software. Infrastructure is carefully managed, with domains often registered years in advance of their use in attacks, blending into legitimate traffic. This "slow and low" approach, avoiding disruptive attacks, is classic of advanced persistent threat (APT) groups focused on espionage.

The implications of this discovery are significant for regional and global cybersecurity. It underscores the relentless nature of state-aligned cyberespionage, where campaigns are measured not in days or months, but in years and decades. The targeting aligns directly with China's strategic geopolitical interests in the South China Sea, highlighting how cyber operations are a core component of modern statecraft and intelligence gathering. For defense organizations globally, this serves as a stark reminder that network defenders must assume a long-term adversary is already present, necessitating continuous threat hunting, robust network segmentation, and a focus on detecting subtle, low-volume data exfiltration rather than just preventing initial breach.

Telegram X LinkedIn
Back to News