CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Sustained China-nexus Intrusion Campaign Targets Azerbaijani Energy Sector via ProxyNotShell Exploitation

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A Chinese-nexus threat actor attributed to FamousSparrow (UAT-9244) conducted a multi-wave intrusion against an Azerbaijani oil and gas company between December 2025 and February 2026, leveraging the ProxyNotShell exploit chain for initial access despite remediation efforts. The campaign involved three distinct waves deploying Deed RAT (a ShadowPad successor) and TernDoor (recently observed in South American telecom attacks), with repeated re-exploitation of the same Microsoft Exchange Server entry point. Attackers refined evasion techniques, including DLL side-loading via LogMeIn Hamachi with two-stage trigger design, to deploy payloads and maintain persistence. Lateral movement and redundant footholds were established to ensure operational resilience.

Timeline

  1. 13.05.2026 16:00 1 articles · 2h ago

    FamousSparrow Multi-Wave Intrusion Targets Azerbaijani Energy Sector via ProxyNotShell

    December 25, 2025: Initial compromise via ProxyNotShell with deployment of Deed RAT using DLL side-loading via LogMeIn Hamachi. Late January/early February 2026: Second wave attempts to deploy TernDoor via Mofu Loader; lateral movement observed. Late February 2026: Third wave deploys modified Deed RAT with C2 at sentinelonepro[.]com, reinforcing persistence and refining evasion techniques.

    Show sources

Information Snippets