• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Latest Cybersecurity News

Dragon Breath APT Adopts New DLL Side-Loading Mechanism in Attacks

William Marshal Posted On May 6, 2023
0



Dragon Breath APT

Sophos researcher Gabor Szappanos has revealed that Dragon Breath, a notorious advanced persistent threat (APT) actor, has adopted a new DLL side-loading mechanism to add more complexity to its attacks.

According to Szappanos, the attack is based on a classic side-loading attack consisting of a clean application, a malicious loader, and an encrypted payload with various modifications over time.

Dragon Breath APT Group’s Background and Activities

Dragon Breath, also known as APT-Q-27 and Golden Eye, was first documented by QiAnXin in 2020. The group was found to have launched a watering hole campaign designed to trick users into downloading a trojanized Windows installer for Telegram. Dragon Breath is believed to be part of a larger entity called Miuuti Group, which targets the online gaming and gambling industries.

The group has been characterized as a “Chinese-speaking” entity, joining the likes of other Chinese activity clusters like Dragon Castling, Dragon Dance, and Earth Berberoka.

Double-Dip DLL Side-Loading Strategy

The latest campaigns launched by Dragon Breath APT Group have added a new twist to the attack, where a first-stage clean application “side”-loads a second clean application and auto-executes it. The second clean application side-loads the malicious loader DLL, which then executes the final payload.

This double-dip DLL side-loading strategy has been leveraged in attacks targeting users in the Philippines, Japan, Taiwan, Singapore, Hong Kong, and China.

Use of Tampered Installers for Other Apps

Dragon Breath is believed to have created multiple variations of the scheme, in which tampered installers for other apps, such as LetsVPN and WhatsApp, are used to initiate the attack chain. The next stage involves the use of a second clean application as an intermediate to avoid detection and load the final payload via a malicious DLL.

The payload used by Dragon Breath functions as a backdoor capable of downloading and executing files, clearing event logs, extracting and setting clipboard content, running arbitrary commands, and stealing cryptocurrency from the MetaMask wallet extension for Google Chrome.

Dragon Breath APT

Continued Vitality of DLL Side-Loading

According to Szappanos, DLL side-loading, first identified in Windows products in 2010 but prevalent across multiple platforms, continues to be an effective and appealing tactic for threat actors.

He added that the double-clean-app technique employed by Dragon Breath represents the continued vitality of this approach, targeting a user sector (online gambling) that has traditionally been less scrutinized by security researchers.

Initial Vector of Dragon Breath APT Attack

The initial vector of the Dragon Breath attack involves a fake website hosting an installer for Telegram. When opened, the installer creates a desktop shortcut that is designed to load malicious components behind the scenes upon launch while also displaying the Telegram app user interface.

Despite the group’s sophisticated tactics, the attempted intrusions by Dragon Breath in the Philippines, Japan, Taiwan, Singapore, Hong Kong, and China were ultimately unsuccessful.

Dragon Breath’s adoption of the new DLL side-loading mechanism highlights the group’s increasing sophistication and complexity in its attack methods.

Security researchers urge users to remain vigilant and cautious while downloading and installing software from untrusted sources. It is important to keep all software and operating systems updated to prevent vulnerabilities that can be exploited by threat actors like Dragon Breath.

Share the article with your friends


Cybersecuritydata securityhacking


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Top 9 Best Log Management Tools for 2025
September 20, 2025
Top 4 Remote Support Tools for 2025- Best Remote Support Solution
September 18, 2025
Top 5 Best Unified Endpoint Management (UEM) Software for 2025
September 12, 2025
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search