SHADOW-EARTH-053
China-aligned (moderate confidence — assessed as possible state contractor) · Strategic espionage / transnational repression
Tactics, Techniques & Procedures (TTPs)
- N-day exploitation of internet-facing Microsoft Exchange and IIS servers (ProxyLogon chain)
- GODZILLA web shell deployment for persistent command execution
- ShadowPad backdoor delivery via DLL sideloading of legitimate AnyDesk binary
- Dual targeting: government/defence entities and journalists/civil society activists
- IT supply chain targeting — compromising consultancies with Ministry of Defence contracts
- Encrypted C2 communications via ShadowPad modular architecture
Known Targets
Analyst Notes
Identified by Trend Micro and Broadcom in April–May 2026. The dual targeting of government/defence entities alongside journalists and Uyghur activists indicates both a foreign intelligence mandate and a domestic surveillance/transnational repression objective — a distinguishing characteristic of Chinese state-contracted operations. Closely related cluster SHADOW-EARTH-054 independently compromised roughly half the same targets using identical tool hashes, suggesting parallel tasking by the same sponsoring authority. The continued effectiveness of ProxyLogon-chain exploitation in 2026 reflects persistent patch management failures across affected sectors.
Also Known As