📱 TA415 abuse des tunnels distants de VS Code via spearphishing pour un accùs persistant furtif
📝 Source: Proofpoint — Dans le cadre d’opĂ©rations menĂ©es en juillet e...
📖 cyberveille : https://cyberveille.ch/posts/2025-09-17-ta415-abuse-des-tunnels-distants-de-vs-code-via-spearphishing-pour-un-acces-persistant-furtif/
🌐 source : https://www.proofpoint.com/us/blog/threat-insight/going-underground-china-aligned-ta415-conducts-us-china-economic-relations
#IOC #TA415 #Cyberveille
TA415 abuse des tunnels distants de VS Code via spearphishing pour un accĂšs persistant furtif

Source: Proofpoint — Dans le cadre d’opĂ©rations menĂ©es en juillet et aoĂ»t 2025, l’acteur Ă©tatique chinois TA415 (associĂ© Ă  APT41) a ciblĂ© des organismes gouvernementaux amĂ©ricains, des think tanks et des institutions acadĂ©miques focalisĂ©s sur les relations États-Unis–Chine. Les attaquants ont usurpĂ© l’identitĂ© de hauts responsables, dont la prĂ©sidence du Select Committee on Strategic Competition et l’US-China Business Council, pour livrer des charges menant Ă  la mise en place de VS Code Remote Tunnels. Cette approche illustre un virage notable vers des techniques de living-off-the-land s’appuyant sur des services lĂ©gitimes pour le C2. 🎯

CyberVeille

Proofpoint threat researchers published new research identifying a new cyber-espionage campaign by #TA415 (#APT41), a China-aligned threat actor, exploiting growing uncertainty in U.S.-China economic relations.

🔗 Full blog: https://www.proofpoint.com/us/blog/threat-insight/going-underground-china-aligned-ta415-conducts-us-china-economic-relations

The group is impersonating trusted organizations and policymakers to target U.S. government, academic, and think tank targets.

See our blog for a detailed breakdown of these July and August 2025 campaigns, infection chain, IOCs, and Emerging Threats rulesets. 

Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels
#TA415 #WhirlCoil
https://www.proofpoint.com/us/blog/threat-insight/going-underground-china-aligned-ta415-conducts-us-china-economic-relations
Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels | Proofpoint US

What happened  Throughout July and August 2025, TA415 conducted spearphishing campaigns targeting United States government, think tank, and academic organizations utilizing U.S.-China

Proofpoint

A new DISCARDED podcast episode is here 🚹

👉 https://ow.ly/H3SO50Ukn7w

Listen in to hear APT research expert Mark Kelly share his insight on the #cybercrime and state-sponsored espionage of #TA415 (AKA #APT41 #BrassTyphoon).

DISCARDED | Proofpoint | Proofpoint US

DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack pat...

In August 2024, Proofpoint published research highlighting an unusual, suspected espionage campaign targeting dozens of organizations worldwide to deliver a custom malware family named “Voldemort”.

Proofpoint analysts now attribute this campaign to the China-aligned threat group #TA415 (also known as #APT41 and #BrassTyphoon).

This attribution is based on multiple newly identified high confidence links between the campaign distributing Voldemort and known TA415-attributed infrastructure, including overlaps with activity publicly reported by Mandiant in July 2024: https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-dust.

Furthermore, in late August 2024, Proofpoint identified a targeted campaign featuring an almost identical attack chain to deliver the Voldemort backdoor. This activity spoofed a Taiwanese aerospace industry association and repeatedly targeted fewer than five aerospace companies in the US and Taiwan, aligning with more typical targeting associated with TA415 and other China-aligned actors.

The screenshot below shows a machine translated version of a phishing email associated with this campaign (originally written in Traditional Chinese).

In this campaign, TA415 began using Google AMP Cache URLs that redirected to password protected 7-Zip files hosted on OpenDrive. These archives contained malicious Microsoft Shortcut (LNK) files that attempted to download a Python script hosted on paste[.]ee. This activity continued into late September 2024 and also targeted a small number of organizations in the chemicals, insurance, and manufacturing industries.

The initial widespread #TA415 campaign distributing Voldemort remains unusual due to its widespread targeting and techniques more commonly observed in cybercrime activity.

While this volume of targeting from an APT actor is uncommon, it is not unheard of, as Proofpoint
observed similar high volume targeting by the Russia state-aligned threat actor #TA422 in 2023: https://ow.ly/BJuW50TQSt0.

âŹ‡ïžâŹ‡ïžâŹ‡ïž

Read our recent blog to learn more about the TA415 Voldemort campaign: https://ow.ly/8Cka50TQSv1.

APT41 Has Arisen From the DUST | Google Cloud Blog

Mandiant has observed a sustained campaign by the advanced persistent threat group APT41.

Google Cloud Blog