Lotus Blossom Strikes Again: Sagerunex Backdoor Targets Asia’s Key Sectors

China-linked Lotus Blossom APT is back, targeting Asian governments and industries with new Sagerunex backdoor variants. Using cloud services for stealth, they’re the cyber ninjas of the digital world. Forget traditional VPS, it’s Dropbox, Twitter, and Zimbra all the way! It’s espionage with a high-tech twist—cyber espionage just got a lot more interesting!

Pro Dashboard

Hot Take:

Move over, pandas! The Lotus Blossom APT is here to remind us that when it comes to cyber espionage, they’re the true masters of disguise. With their new Sagerunex backdoor, they’ve taken the concept of “cloud storage” to a whole new level—because nothing says ‘we’re watching you’ quite like hacking into your Dropbox and tweeting about it!

Key Points:

  • Lotus Blossom APT linked to cyber attacks on Asian government and industry sectors.
  • New Sagerunex backdoor variants use cloud services for command and control.
  • Targets include telecommunications, media, government, and manufacturing sectors.
  • Innovative tools used for evasion and persistence, including cookie stealers and proxy tools.
  • Operations have been persistent since at least 2018 with possible ongoing activities.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?