Web server exploits and Mimikatz linked to years-long attacks on Asian critical sectors


A newly detailed cyber campaign has targeted high-value organizations across South, Southeast, and East Asia by exploiting internet-facing web servers, planting web shells, stealing credentials, and moving deeper into both Windows and Linux environments. Palo Alto Networks Unit 42 says the activity cluster, tracked as CL-UNK-1068, hit aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications organizations, and it assesses with high confidence that the attackers are a Chinese threat actor.

Unit 42 also says the campaign appears geared mainly toward cyber espionage. The researchers describe a toolset built around custom malware, modified open-source tools, and living-off-the-land binaries, which helped the attackers keep long-term access while blending into normal activity.

The report stands out because it tracks the activity back to at least 2020 and shows a practical, low-noise intrusion style rather than one flashy malware family. In many cases, the attackers appear to have started with web server exploitation, deployed web shells such as Godzilla and AntSword, then collected sensitive files, credentials, and host data from compromised systems.

What happened

According to Unit 42, a typical intrusion chain began with the exploitation of a web server, followed by web-shell deployment and lateral movement to additional hosts. The attackers then looked for files such as web.config, .aspx, .asmx, .asax, and .dll under c:\inetpub\wwwroot on Windows web servers, likely to steal credentials, understand the application environment, or uncover additional weaknesses.

The group also collected browser history and bookmarks, XLSX and CSV files from user directories, and .bak database backup files from Microsoft SQL Server systems. That mix suggests an operator looking for credentials, internal documentation, and business data that can support long-term intelligence collection.

One of the more unusual details in the report involves exfiltration. Unit 42 says the attackers sometimes archived stolen files with WinRAR, encoded the archive with certutil -encode, and then used the type command to print the Base64 output to the screen through a web shell. That let them extract data in text form even when the shell did not support direct file transfer.

Why Mimikatz matters here

Mimikatz remains one of the most recognized post-compromise tools because it can dump passwords and other secrets from memory on Windows systems. In this campaign, Unit 42 says CL-UNK-1068 used Mimikatz alongside LsaRecorder, DumpItForLinux, Volatility, and a SQL Server Management Studio password export tool to collect credentials across both Windows and Linux environments.

That behavior fits a broader trend in modern intrusions. CISA and partner agencies warned in 2024 that living-off-the-land techniques and abuse of legitimate admin tools make attacks harder to detect because the activity can resemble normal system behavior. Those same agencies also highlighted credential access, reconnaissance, persistence, and lateral movement as common goals in stealthy post-exploitation operations.

Tools and techniques seen in the campaign

AreaTools or methods Unit 42 describedWhy it matters
Initial access and footholdWeb server exploitation, Godzilla, AntSwordLets attackers gain a quiet foothold on exposed servers
Credential theftMimikatz, LsaRecorder, DumpItForLinux, Volatility, SSMS password export toolHelps attackers move laterally and access sensitive systems
Persistence and tunnelingFast Reverse Proxy, DLL side-loading, legitimate Python executablesGives long-term remote access while masking malicious execution
ReconnaissanceSuperDump, batch scripts, custom scanner ScanPortPlusMaps hosts, services, and local environment for next-stage actions
ExfiltrationWinRAR, certutil encoding, command-line output via web shellMoves data out in a way that may avoid simpler transfer controls

Why critical infrastructure should pay attention

This campaign did not rely on a single rare zero-day or one signature-heavy backdoor. It leaned on web exploitation, web shells, open-source tools, credential theft, and legitimate binaries. That makes the activity more repeatable and harder to spot, especially in organizations with large server estates and uneven logging.

The cross-platform angle also matters. Unit 42 says the operators maintained different tool variants for Windows and Linux, which is important for sectors like telecom, energy, and government where mixed environments are common. When one actor can pivot across web servers, endpoints, databases, and Linux systems with the same campaign logic, defenders need visibility across the whole estate, not only Windows endpoints.

What defenders should do now

  • Audit internet-facing web servers for shells, suspicious scripts, and unusual file access patterns around application directories such as inetpub\wwwroot.
  • Hunt for credential-dumping behavior tied to Mimikatz, LSA hooking, memory capture, and unusual access to SSMS credential stores.
  • Watch for living-off-the-land activity involving certutil, type, compression utilities, Python executables, and DLL side-loading chains.
  • Review outbound tunnels, FRP-like behavior, and long-lived remote access paths that do not match approved administration workflows.
  • Segment critical systems and tighten access between web tiers, database servers, and user endpoints so a compromised server cannot easily become a pivot point.

Big picture

The most important takeaway is not just that Mimikatz showed up again. It is that a long-running threat cluster appears to have combined ordinary web compromises with patient credential theft and quiet data collection against strategically important sectors in Asia. That combination makes the campaign dangerous because it does not need to look exotic to be effective.

For defenders, this report reinforces a familiar lesson. If an exposed web server falls, the incident may not stay confined to the web tier for long. The follow-on risk often comes from the tools attackers use after initial access, especially the ones that look legitimate at first glance.

FAQ

Who is behind the campaign?

Palo Alto Networks Unit 42 says it assesses with high confidence that CL-UNK-1068 is a Chinese threat actor. It also says the main objective is likely cyber espionage, though it does not fully rule out cybercriminal motives.

Which sectors were targeted?

Unit 42 lists aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications organizations across South, Southeast, and East Asia.

How did the attackers get in?

The report says typical attack chains began with web server exploitation, followed by web shells, lateral movement, credential theft, and data collection.

Why is Mimikatz still important?

Because it remains a practical tool for credential dumping after initial compromise. In this campaign, it was part of a broader credential-theft toolkit that helped the attackers move inside victim environments.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages