{"id":51724,"date":"2023-05-02T21:58:00","date_gmt":"2023-05-02T21:58:00","guid":{"rendered":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics"},"modified":"2023-05-02T21:58:00","modified_gmt":"2023-05-02T21:58:00","slug":"apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/","title":{"rendered":"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc0a364a809e0d436\/64517fde2303c427c81c0048\/Earth-Globe-Iulia_Bycheva-Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>After months of inactivity, Earth Longzhi \u2014 a suspected subgroup of <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/china-based-threat-group-launches-widespread-malicious-campaign\" target=\"_blank\" rel=\"noopener\">the notorious APT41<\/a> \u2014 is again attacking organizations across industry targets in Southeast Asia. And researchers believe they know who it&#8217;s targeting next.<\/p>\n<p>APT41 is one of China&#8217;s most well-known cyber threats \u2014 or, rather, an umbrella label for <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/sidewalk-malware-tied-to-china-linked-espionage-group\" target=\"_blank\" rel=\"noopener\">multiple subgroups<\/a>. Over the years <a href=\"https:\/\/www.darkreading.com\/remote-workforce\/china-apt41-baffling-approach-cobalt-strike-payload\" target=\"_blank\" rel=\"noopener\">it has constantly switched up its TTPs<\/a> in espionage attacks against <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/china-linked-cyber-espionage-team-homes-in-on-hong-kong-government-orgs\" target=\"_blank\" rel=\"noopener\">government agencies<\/a>, <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/apt41-taps-google-red-teaming-tool-targeted-info-stealing-attacks\" target=\"_blank\" rel=\"noopener\">enterprises<\/a>, and even <a href=\"https:\/\/www.darkreading.com\/mobile\/mobile-security\/chinese-linked-apt41-can-read-your-texts-\/a\/d-id\/755304\" target=\"_blank\" rel=\"noopener\">individuals<\/a>. Its <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/log4j-and-livestock-apps-apt41-wages-persistent-cyberattack-campaign-on-us-government\" target=\"_blank\" rel=\"noopener\">attacks against the US government<\/a>, in particular, have made enough noise to earn its members <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/indictments-unlikely-to-deter-china-s-apt41-activity\" target=\"_blank\" rel=\"noopener\">indictments from US law enforcement<\/a>.<\/p>\n<p>On May 2, researchers from Trend Micro revealed <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/23\/e\/attack-on-security-titans-earth-longzhi-returns-with-new-tricks.html\" target=\"_blank\" rel=\"noopener\">details of a new campaign<\/a> from Earth Longzhi, a suspected subgroup of APT41.<\/p>\n<p>Earth Longzhi had been on something of a hiatus since its most recent campaign, which began in August 2021 and ended last June. In that case, it targeted organizations across industries \u2014 defense, aviation, insurance, and urban development \u2014 in countries around the Asia-Pacific region \u2014 Taiwan, Thailand, Malaysia, Indonesia, Pakistan, Ukraine, and China itself.<\/p>\n<p>Now, after nearly a year, Earth Longzhi is back, utilizing newer and better stealth tactics in espionage campaigns against many of the same kinds of targets.<\/p>\n<h2 class=\"regular-text\">Earth Longzhi&#8217;s Evolving TTPs<\/h2>\n<p>Rather than tried-and-true phishing emails, Earth Longzhi has tended to target public-facing Internet Information Services (IIS) and Microsoft Exchange servers as inroads to install the popular <a href=\"https:\/\/github.com\/rebeyond\/Behinder\" target=\"_blank\" rel=\"noopener\">Behinder Web shell<\/a>. Using Behinder, it can gather information and download further malware onto host systems.<\/p>\n<p>Further, the group has utilized dynamic link library (DLL) sideloading, disguising malware as a legitimate DLL \u2014 MpClient.dll \u2014 to trick the legitimate Windows Defender binaries MpDlpCmd.exe and MpCmdRun.exe into loading it.<\/p>\n<p>Earth Longzhi primarily delivers two types of malware, according to Trend Micro: Croxloader, a loader for <a href=\"https:\/\/www.darkreading.com\/application-security\/microsoft-fortra-health-isac-team-up-to-remove-illicit-cobalt-strike-tools\" target=\"_blank\" rel=\"noopener\">Cobalt Strike<\/a>, and a new anti-detection tool called SPHijacker.<\/p>\n<p>SPHijacker is specially designed to disable security products in their tracks, either by utilizing a vulnerable driver \u2014 zamguard.sys \u2014 or by abusing the undocumented &#8220;MinimumStackCommitInBytes&#8221; values in the IFEO registry key to perform a kind of denial of service.<\/p>\n<p>&#8220;These methods are not overly novel and sophisticated,&#8221; explains James Lively, endpoint security research specialist at Tanium. &#8220;However,&#8221; he adds, &#8220;the knowledge, understanding, and tradecraft required to use them efficiently and accurately is.&#8221;<\/p>\n<h2 class=\"regular-text\">Where Earth Longzhi Is Going From Here<\/h2>\n<p>In this newest campaign, Earth Longzhi targeted organizations in government, healthcare, technology, and manufacturing, across the Philippines, Thailand, Taiwan, and a country they&#8217;ve never targeted before: Fiji.<\/p>\n<p>But there&#8217;s a wrinkle in the story. In the course of their investigation, the researchers came across a series of decoy documents written in Vietnamese and Indonesian, hidden among the hackers&#8217; files.<\/p>\n<p>&#8220;Based on these decoy documents,&#8221; the researchers wrote, &#8220;it can be inferred that the threat actors were keen on targeting users in Vietnam and Indonesia for its next wave of attacks.&#8221;<\/p>\n<p>With more attacks to come, organizations in and around the Asia-Pacific will need to stay attuned to the threat. With Earth Longzhi&#8217;s penchant for targeting vulnerable, internet-exposed servers, &#8220;potential targets need to ensure that everything in their environment, especially public facing to the Internet, is fully patched and updated,&#8221; Lively says. Otherwise, they may just be the next victim.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The notorious Chinese APT is spreading cyber maliciousness around Southeast Asia, and its next targets are already in sight.Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51724","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-02T21:58:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc0a364a809e0d436\/64517fde2303c427c81c0048\/Earth-Globe-Iulia_Bycheva-Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics\",\"datePublished\":\"2023-05-02T21:58:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/\"},\"wordCount\":537,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltc0a364a809e0d436\\\/64517fde2303c427c81c0048\\\/Earth-Globe-Iulia_Bycheva-Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/\",\"name\":\"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltc0a364a809e0d436\\\/64517fde2303c427c81c0048\\\/Earth-Globe-Iulia_Bycheva-Alamy.jpg\",\"datePublished\":\"2023-05-02T21:58:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltc0a364a809e0d436\\\/64517fde2303c427c81c0048\\\/Earth-Globe-Iulia_Bycheva-Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltc0a364a809e0d436\\\/64517fde2303c427c81c0048\\\/Earth-Globe-Iulia_Bycheva-Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/","og_locale":"en_US","og_type":"article","og_title":"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-02T21:58:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc0a364a809e0d436\/64517fde2303c427c81c0048\/Earth-Globe-Iulia_Bycheva-Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics","datePublished":"2023-05-02T21:58:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/"},"wordCount":537,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc0a364a809e0d436\/64517fde2303c427c81c0048\/Earth-Globe-Iulia_Bycheva-Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/","url":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/","name":"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc0a364a809e0d436\/64517fde2303c427c81c0048\/Earth-Globe-Iulia_Bycheva-Alamy.jpg","datePublished":"2023-05-02T21:58:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc0a364a809e0d436\/64517fde2303c427c81c0048\/Earth-Globe-Iulia_Bycheva-Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc0a364a809e0d436\/64517fde2303c427c81c0048\/Earth-Globe-Iulia_Bycheva-Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apt41-subgroup-plows-through-asia-pacific-utilizing-layered-stealth-tactics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51724"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51724\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}