Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

China's Sinister Use of Espionage Tools in Recent RA World Ransomware Attack



Chinese espionage tools have been found to be used in a recent ransomware attack known as the RA World ransomware, highlighting the increasing sophistication and complexity of modern threat actors, particularly those linked to China. The use of espionage tools by Emperor Dragonfly suggests that there may be a blurring of lines between traditional espionage and financially motivated cybercrime activities.

  • The RA World ransomware attack was carried out by Emperor Dragonfly, a China-based threat actor.
  • Emperor Dragonfly deployed the PlugX (Korplug) backdoor and Toshiba executable in the attack, which is also used by espionage actors.
  • The attack shares similarities with other variants of the PlugX backdoor and was followed by an RA World ransomware attack, suggesting "moonlighting" as a ransomware actor for personal profit.
  • Symantec's researchers observed overlap between state-backed cyber espionage actors and financially motivated cybercrime groups.
  • The use of advanced tools like NPS proxy and Korplug backdoor by Emperor Dragonfly highlights the sophistication of modern threat actors.



  • Chinese espionage tools have been found to be used by a China-based threat actor, tracked as Emperor Dragonfly, in a recent ransomware attack known as the RA World ransomware. The attacker, who is commonly associated with cybercriminal endeavors, deployed the ransomware against an Asian software and services company and demanded an initial ransom payment of $2 million.

    Researchers from Symantec's Threat Hunter Team observed the activity in late 2024 and highlighted a potential overlap between state-backed cyber espionage actors and financially motivated cybercrime groups. According to the researchers, "tools associated with China-based espionage groups are often shared resources" but "many aren't publicly available and aren't usually associated with cybercrime activity."

    The RA World ransomware attack is believed to have been spawned from an earlier ransomware group known as the RA Group, which launched in 2023 as a Babuk-based family. The RA World ransomware variant shares similarities with other variants of the PlugX (Korplug) backdoor, which has previously been used by espionage actors.

    Between July 2024 and January 2025, Emperor Dragonfly targeted government ministries and telecom operators in Southeast Europe and Asia, with the apparent goal being long-term persistence. The China-based threat actor deployed a specific variant of the PlugX (Korplug) backdoor, along with a Toshiba executable (toshdpdb.exe) via DLL sideloading, as well as a malicious DLL (toshdpapi.dll). Additionally, Symantec observed the use of NPS proxy, a China-developed tool used for covert network communication, and various RC4-encrypted payloads.

    In November 2024, the same Korplug payload was used against a South Asian software company. This time, it was followed by an RA World ransomware attack, suggesting that Emperor Dragonfly may be "moonlighting" as a ransomware actor for personal profit.

    Symantec's report lists the indicators of compromise (IoCs) associated with the observed activity to help defenders detect and block the attacks before damage is done. The incident highlights the potential for state-backed cyber espionage actors to engage in financially motivated cybercrime activities, potentially blurring the lines between traditional espionage and ransomware attacks.

    The fact that Emperor Dragonfly used tools previously attributed to espionage actors in a ransomware attack raises questions about the motivations and capabilities of these threat actors. It is unclear whether Emperor Dragonfly's use of espionage tools was solely for legitimate intelligence gathering purposes or if it was also intended to facilitate their criminal activities.

    Symantec's researchers have noted that many China-based espionage groups share resources, but rarely engage in cybercrime activities. However, the RA World ransomware attack suggests that there may be some overlap between these groups and financially motivated cybercrime actors.

    The use of advanced tools like NPS proxy and Korplug backdoor by Emperor Dragonfly highlights the sophistication and capabilities of modern threat actors. The fact that they were able to deploy these tools in a ransomware attack raises concerns about the potential for state-backed actors to engage in complex and multifaceted cyber operations.

    In conclusion, the RA World ransomware attack highlights the increasing sophistication and complexity of modern threat actors, particularly those linked to China. The use of espionage tools by Emperor Dragonfly in this attack suggests that there may be a blurring of lines between traditional espionage and financially motivated cybercrime activities. As such, defenders must remain vigilant and proactive in detecting and blocking these types of attacks.



    Related Information:

  • https://www.bleepingcomputer.com/news/security/chinese-espionage-tools-deployed-in-ra-world-ransomware-attack/


  • Published: Thu Feb 13 10:05:29 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us