Earth Lamia: China-Nexus APT Exploiting Web Application Flaws Across Asia

·

·

3–4 minutes
Threat Actor:

Introduction

Earth Lamia is a China-linked Advanced Persistent Threat (APT) group conducting cyber espionage campaigns across Brazil, India, and Southeast Asia. Active since at least 2023, the group focuses on web application vulnerabilities, custom malware deployment, and systematic targeting of government, finance, and critical infrastructure sectors.

Historical Evolution

  • 2023–Early 2024: Initial focus on financial services (e.g., securities firms) in South Asia
  • Mid-2024: Expansion into logistics and online retail across Southeast Asia
  • Late 2024–2025: Shift to academic, IT, and government entities, including critical infrastructure

Attribution is strongly linked to China based on toolsets, language artifacts, victimology, and operational patterns.

China-linked threat actors targeting web application vulnerabilities operate with patience and precision. Organizations running customer-facing applications in Asia need threat intelligence that reflects active targeting patterns.

Noorstream delivers threat intelligence, vulnerability management, and offensive security assessments for high-risk environments.

→ Book a Strategic Security Briefing

Technical Breakdown

Initial Access

  • Systematic scanning for SQLi in public-facing apps
  • Exploitation using tools like sqlmap
  • Creation of rogue admin accounts (e.g., sysadmin123)

Exploited CVEs

  • Legacy: CVE-2017-9805 (Apache Struts2), CVE-2021-22205 (GitLab)
  • 2024: CVE-2024-9047, 27198/99, 51378/51567, 56145
  • 2025: CVE-2025-31324 (SAP NetWeaver RCE)

Malware Arsenal

PULSEPACK (.NET modular backdoor)

  • AES-encrypted TCP and WebSocket comms
  • Plugin-based dynamic capability loading
  • Deployed via DLL sideloading

BypassBoss

  • Privilege escalation based on Sharp4PrinterNotifyPotato

Utility Stack

  • Recon: Fscan, Kscan, nltest.exe
  • Creds: SAM/LSASS memory extractors
  • Persistence: schtasks.exe
  • Cleanup: wevtutil.exe
  • Tunnels: Rakshasa, Stowaway

TTPs (MITRE ATT&CK Mapping)

  • Recon: T1595.002, T1590
  • Access: T1190, T1078
  • Execution: T1059.001, T1059.003
  • Persistence: T1053.005, T1505.003, T1136.001
  • Evasion: T1574.001, T1620, T1036.005
  • C2: T1095, T1573.001

Post-Exploitation Flow

  1. Tool deployment via certutil.exe/PowerShell
  2. Web shell deployment
  3. Privilege escalation (Potato-family COM/DCOM exploits [2022 variant], JuicyPotato, BypassBoss)
  4. Credential harvesting
  5. Lateral movement
  6. Data exfiltration
  7. Log cleanup

Case Studies

REF0657 Campaign (2024)

Financial sector in South Asia; Cobalt Strike via MemoryEvasion; Sophosx64.exe as Potato-family privilege escalation module (2022 variant)

STAC6451 (2024)

Mimic ransomware attempts in India—unsuccessful, likely used for distraction

CL-STA-0048 (2025)

DNS exfiltration, hex staging, and SQLcmd abuse in South Asia

DragonRank Links

Potential operational overlap or coordination with another China-nexus APT

Strategic Implications

  • Nation-State Objectives: Intelligence gathering on finance, telecom, and government
  • Tool Adaptability: Weaponization of open-source and legacy tooling
  • Infrastructure Abuse: High-volume IP use across Asia-Pacific
  • Blurred Lines: Espionage mixed with pseudo-ransomware operations

Future Outlook

Earth Lamia is likely to:

  • Continue weaponizing zero-days in enterprise platforms
  • Improve malware stealth (e.g., more fileless, in-memory variants)
  • Expand to target under-patched sectors like health, education, and energy
  • Scale operations through automation (vuln scanning, loader chains)

Noorstream Perspective

Earth Lamia reflects a new class of APTs: high-discipline cyber actors merging legacy exploit reliability with modern malware modularity. Their operational flow—web app scanning → SQLi → sideloaded implants → staged exfil—demands continuous vigilance.

This threat reinforces our doctrine:

Context is the new perimeter. Patch priority is intelligence-driven. Legacy does not mean low-risk.

Every defender must transition from CVSS-based triage to contextual vulnerability management and threat-centric hunting.


References

Source: Trend Micro Research
Title: “Earth Lamia Develops Custom Arsenal to Target Multiple Industries”
Date: May 26, 2025
URL: https://www.trendmicro.com/en_us/research/25/e/earth-lamia.html
Source Type: Primary Threat Report
Attribution Confidence: High


Source: Elastic Security Labs
Title: “Unmasking a Financial Services Intrusion: REF0657”
Date: January 30, 2024
URL: https://www.elastic.co/security-labs/unmasking-financial-services-intrusion-ref0657
Source Type: Incident Analysis
Attribution Confidence: High


Source: Fortinet FortiGuard
Title: “Earth Lamia APT Attack Campaign Overview”
Date: April 2025
URL: https://fortiguard.fortinet.com/outbreak-alert/earth-lamia-apt-attack
Source Type: Threat Summary
Attribution Confidence: Medium


Source: Unit42 (Palo Alto Networks)
Title: “Espionage Campaign Targets South Asian Entities”
Date: February 2025
URL: https://unit42.paloaltonetworks.com/espionage-campaign-targets-south-asian-entities/
Source Type: Campaign Analysis
Attribution Confidence: High


Source: The Hacker News
Title: “China-Linked Hackers Exploit SAP and Visual Composer Platforms”
Date: May 2025
URL: https://thehackernews.com/2025/05/china-linked-hackers-exploit-sap-and.html
Source Type: Exploit Disclosure Reporting
Attribution Confidence: High


Source: Cybersecurity Help CZ
Title: “APT Group Earth Lamia Exploits SQL Injection for Persistent Access”
Date: April 2025
URL: https://www.cybersecurity-help.cz/blog/4761.html
Source Type: Technical Threat Blog
Attribution Confidence: Medium


Source: LinkedIn Pulse – Bise Threat Research
Title: “Modular Backdoor Threats Target Brazil, India, Southeast Asia”
Date: September 2024
URL: https://www.linkedin.com/pulse/modular-backdoor-threats-risks-brazil-india-southeast-bise–5yl7e
Source Type: Malware Analysis
Attribution Confidence: Medium

Latest Exploited Vulnerabilities

  • CVE-2025-32432
    Craft CMS Code Injection Vulnerability
    Vendor: Craft CMS
    Affected Product: Craft CMS
    Exploit Confirmed: 2026-03-20
  • CVE-2025-54068
    Laravel Livewire Code Injection Vulnerability
    Vendor: Laravel
    Affected Product: Livewire
    Exploit Confirmed: 2026-03-20
  • CVE-2025-43510
    Apple Multiple Products Improper Locking Vulnerability
    Vendor: Apple
    Affected Product: Multiple Products
    Exploit Confirmed: 2026-03-20
  • CVE-2025-43520
    Apple Multiple Products Classic Buffer Overflow Vulnerability
    Vendor: Apple
    Affected Product: Multiple Products
    Exploit Confirmed: 2026-03-20
  • CVE-2025-31277
    Apple Multiple Products Buffer Overflow Vulnerability
    Vendor: Apple
    Affected Product: Multiple Products
    Exploit Confirmed: 2026-03-20

Built to Defend. Engineered for Real-World Cyber Threats.



© 2026 Noorstream Security. All Rights Reserved.

Discover more from Noorstream Security

Subscribe now to keep reading and get access to the full archive.

Continue reading