China’s LapDogs: The Espionage Campaign Fetching Data with Sneaky Backdoor Tricks!

The LapDogs campaign by a China-linked APT has unleashed a network of over 1,000 backdoored nodes for espionage, targeting IT, media, and more. Their stealthy trick? Installing ShortLeash backdoors on routers, posing as LAPD. This isn’t Hollywood; it’s cybersecurity intrigue with a dash of espionage flair.

Pro Dashboard

Hot Take:

Just when we thought we had seen it all, a China-linked APT group comes in with their new furry espionage campaign, LapDogs. Forget about barking up the wrong tree; these cyber hounds are all about sniffing around your routers. Who knew the biggest threat to your cybersecurity could be your doggedly loyal Wi-Fi?

Key Points:

  • China-linked APT group is behind the LapDogs espionage campaign.
  • More than 1,000 backdoored nodes have been established for spying.
  • Small office/home office routers are targeted using a custom backdoor called ShortLeash.
  • The campaign spoofs TLS certificates as ‘LAPD’ for stealth operations.
  • Connected to more extensive operations known as PolarEdge, targeting IT and other industries.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?