A new wave of cyber-espionage campaigns has been detected throughout 2025, targeting government agencies and law enforcement in South-East Asia. The security firm Check Point has identified this set of operations as Amaranth-Dragon, a group which, due to its arsenal and modus operandi, seems to be connected to the ecosystem known as APT41. The target countries include Cambodia, Thailand, Laos, Indonesia, Singapore and the Philippines, and the intrusions are characterized by their high level of stealth and are carefully timed by regional political and security events. The technical report of the Check Point is available in its public study on these operations at this link: rearch.checkpoint.com.
The central part of many of these campaigns has been the exploitation of a vulnerability in WinRAR, identified as CVE-2025-8088, which allows remote code execution when a specially prepared file is opened by the victim. According to the investigators, the attackers activated exploits against this failure just days after its public disclosure, which shows rapid operational capacity and technical preparation. Mitigation and monitoring of this vulnerability are recorded in the CVE repository: CVE-2025-8088.

As for the mechanics of the attack, the researchers describe a hybrid use of techniques: the adversaries distribute compressed files hosted in legitimate cloud services, such as Dropbox, using lures linked to official news or decisions to increase the likelihood that the recipient will open the file. Within the malicious file is included a dynamic library (DLL) - the call Amaranth Loader- which is activated by DLL side-rolling, a method that takes advantage of legitimate executables to load malicious libraries. The loading process includes the download of a key, the obtaining of an encrypted payload from another URL and its execution directly in memory; the final control of the compromised machine is raised through the open source C2 framework known as Havoc (more information in its repository: github.com / HavocFramework / Havoc).
Not all variants used exactly the same tactic. Initial versions observed in early 2025 resorted to ZIP files with direct Windows access (LNK) and batch scripts (BT) to trigger the side load of the DLL. Another campaign to Indonesia detected the delivery of a remote-access Trojan nicknamed TGAMaranth RAT, distributed through a password-protected RAR using a Telegram bot with predefined commands to exfilter information, take screenshots or transfer files. These variants often incorporate anti-analysis techniques and functionalities to avoid antivirus.
A striking operational feature of Amaranth-Dragon's intrusions is how the command and control infrastructure was configured to minimize exposure: C2 servers were protected by Cloudflare and were programmed to accept connections only from IP addresses belonging to the country or countries attacked, thus reducing visibility and risk of detection outside the target area. Together with compilation marks, time zones and infrastructure management, all this points to a team well funded and disciplined operating within the UTC + 8 time range, according to analysts.
Attribution to APT41 is based on technical overlaps: tool similarities, code development patterns - for example, creating threads within exported functions to run malicious code - and reusing tactics like DLL side-rolling. However, it is important to remember that between actors attributed to the same country there is often an exchange of tools and techniques, so that the borders between groups can be diffuse.
In parallel to this finding, another firm - Dream Research Labs, based in Tel Aviv - has documented a different campaign, called PlugX Diplomacy, attributed to the actor known as Mustang Panda. In that operation, the attackers did not have any new exploits, and they bet on supplanting confidence: attachments that simulate diplomatic summaries or international policy documents were sufficient to compromise the recipient. The execution vector also revolved around compressed files containing a single LNK. When running it, a PowerShell command was launched that extracted an TAR and deployed a file chain that included a signed executable vulnerable to DLL search, a malicious DLL and an encrypted file with PlugX payload. The Dream report is available here: dreamgroup.com. The technique of using legitimate executables to load malicious libraries is listed in the ATT & CK framework as DLL side-rolling.

Both waves leave clear lessons for exposed administrations and organizations: the attackers combine contextualized lures with abuse of services and legitimate binaries to reduce obvious signs of commitment, and timed their actions with real events to increase the credibility of bait. In addition, the use of third-party-protected infrastructure and traffic geofencing demonstrate that attackers invest in low-profile operations to maintain long-term access and collect geopolitical intelligence.
From the defence perspective it is crucial to apply patches and updates as soon as they are available (in this case, update WinRAR against the mentioned CVE), restrict the automatic execution of contents from compressed files or unverified links, harden email controls to reduce speed-phishing and monitor signals from side-loading DLL and execution of unusual processes in endpoints. It is also recommended to review proxy and firewall configurations to detect connection patterns with legitimate cloud services that may be used as repositories for malicious loads. To better understand the phenomenon and the techniques used, reference frameworks such as MITRE ATT & CK provide detailed context on tactics and techniques observed in this type of campaign: attack.mitre.org.
In a scenario where strategic information has direct value in the international arena, these campaigns recall that cybersecurity is one more piece of foreign policy and national security. The teams responsible for diplomacy, defence and law and order must assume that they are not isolated incidents but sustained and adaptive operations, and design defenses that combine agile parking, staff training and network and endpoint visibility to detect early signals before intrusions become long-term penetrations.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...