Lotus Blossom Strikes Again: Sagerunex Backdoor Targets Asia’s Key Sectors
China-linked Lotus Blossom APT is back, targeting Asian governments and industries with new Sagerunex backdoor variants. Using cloud services for stealth, they’re the cyber ninjas of the digital world. Forget traditional VPS, it’s Dropbox, Twitter, and Zimbra all the way! It’s espionage with a high-tech twist—cyber espionage just got a lot more interesting!

Hot Take:
Move over, pandas! The Lotus Blossom APT is here to remind us that when it comes to cyber espionage, they’re the true masters of disguise. With their new Sagerunex backdoor, they’ve taken the concept of “cloud storage” to a whole new level—because nothing says ‘we’re watching you’ quite like hacking into your Dropbox and tweeting about it!
Key Points:
- Lotus Blossom APT linked to cyber attacks on Asian government and industry sectors.
- New Sagerunex backdoor variants use cloud services for command and control.
- Targets include telecommunications, media, government, and manufacturing sectors.
- Innovative tools used for evasion and persistence, including cookie stealers and proxy tools.
- Operations have been persistent since at least 2018 with possible ongoing activities.
Already a member? Log in here