Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Chinese Hacking Group MirrorFace Targeting Europe
  • Security Week

Chinese Hacking Group MirrorFace Targeting Europe

Ionut Arghire Published: March 19, 2025 | Updated: March 19, 2025 2 min read
1 views

Chinese APT actor MirrorFace has been observed targeting a Central European diplomatic institute in relation to the upcoming Expo 2025 event, cybersecurity firm ESET reports.

Also known as Earth Kasha, MirrorFace is operating under the China-linked state sponsored hacking group APT10, focusing on targeting Japanese entities such as the country’s Foreign and Defense ministries, as well as the country’s space agency, politicians, journalists, private companies, and think tanks.

Dubbed Operation AkaiRyū (RedDragon in Japanese), the campaign against the diplomatic institute is the first known MirrorFace attack against a European entity, and has revealed updated tactics, techniques, and procedures (TTPs), and the addition of new tools to the group’s inventory.

MirrorFace has started using APT10’s former signature backdoor Anel (also known as Uppercut), as well as a customized version of AsyncRAT. The attacks started with carefully crafted spearphishing emails carrying malicious attachments.

The use of Anel strengthens the hypothesis that MirrorFace is a subgroup of APT10, given that the backdoor is exclusive to this Chinese state-sponsored group, ESET notes.

As part of attacks observed between June and September 2024, MirrorFace also deployed a customized variant of AsyncRAT, using a complex execution chain to run it in the Windows Sandbox, and used VS Code for its remote tunnels feature, for stealthy access and code execution.

While the hacking group used Anel in the first stages of the attacks, it also deployed its flagship backdoor HiddenFace at a later stage, further bolstering persistence on the infected systems. In 2024, however, the group did not use the LodeInfo backdoor.

In June 2024, the APT was seen targeting two employees of a Japanese research institute in an attack chain that used a signed McAfee executable to load Anel. In August, the group targeted a Central European diplomatic institute with a malicious OneDrive link leading to an Anel infection.

Advertisement. Scroll to continue reading.

Other tools and malware used in these attacks include Anelldr (an Anel loader), HiddenFace (backdoor), FaceXInjector (HiddenFace loader), AsyncRAT (delivered using several files and executed inside Windows Sandbox, which is manually enabled and requires a reboot), and Hidden Start (a tool for bypassing UAC).

As part of the diplomatic institute attack, MirrorFace stole data from one system (including contact information, autofill data, keywords, and stored credit card information from Chrome) and set up various tools on a second system to gain deeper network access.

“During this attack, the threat actor used the upcoming World Expo 2025 – to be held in Osaka, Japan – as a lure. This shows that even considering this new broader geographic targeting, MirrorFace remains focused on Japan and events related to it,” ESET notes.

Related: Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

Related: Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job

Related: CISA Warns of Old jQuery Vulnerability Linked to Chinese APT

Related: Chinese Hackers Exploiting Critical Vulnerability in Array Networks Gateways

About The Author

Ionut Arghire

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Scareware Combined With Phishing in Attacks Targeting macOS Users
Next: Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia

Author's Other Posts

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers Cybersecurity_News-SecurityWeek.jpg

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

April 15, 2025 0 2
Kidney Dialysis Services Provider DaVita Hit by Ransomware ransomware.jpeg

Kidney Dialysis Services Provider DaVita Hit by Ransomware

April 15, 2025 0 0
Conduent Says Names, Social Security Numbers Stolen in Cyberattack Cybersecurity_News-SecurityWeek.jpg

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

April 15, 2025 0 0
2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches Cybersecurity_News-SecurityWeek.jpg

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

April 15, 2025 0 2

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 2
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 2
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 1

Trending Now

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.