ForumsGeneralSHADOW-EARTH-053: Deep Dive on New Asian & NATO Espionage Campaign

SHADOW-EARTH-053: Deep Dive on New Asian & NATO Espionage Campaign

SOC_Analyst_Jay 5/1/2026 USER

Just caught the Trend Micro report on the new threat cluster SHADOW-EARTH-053. It looks like a significant escalation in cyber-espionage, specifically targeting government and defense sectors across South, East, and Southeast Asia, plus a notable NATO member state.

While the article is light on specific CVEs right now, the targeting of journalists and activists alongside government bodies suggests a classic "information harvesting" operation. We've seen similar TTPs from China-aligned actors before, utilizing custom malware and phishing lures relevant to regional geopolitical events.

Since detailed IoCs are still emerging, I've updated our hunting queries to look for the initial access vectors usually associated with these groups—specifically, suspicious child process executions from Office products and unusual network traffic patterns.

Here is a KQL query I’m running in Sentinel to catch potential macro-based droppers or spear-phishing attempts commonly used in these campaigns:

DeviceProcessEvents
| where Timestamp > ago(3d)
| where InitiatingProcessFileName in~ ('winword.exe', 'excel.exe', 'powerpnt.exe')
| where ProcessFileName in~ ('powershell.exe', 'cmd.exe', 'mshta.exe', 'wscript.exe')
| project Timestamp, DeviceName, InitiatingProcessCommandLine, ProcessCommandLine, FolderPath
| order by Timestamp desc

Given the breadth of targets across Asia and Europe, I'm curious if anyone else in the forum has observed similar spikes in phishing traffic or suspicious C2 callbacks in their logs recently? Are we seeing a shift back to macro-based delivery, or is it all web shells these days?

CR
Crypto_Miner_Watch_Pat5/1/2026

Good catch on the parent-child process hunting. We've been seeing a lot of 'living off the land' binaries (LOLBins) in similar sectors recently. You might want to add specific checks for certutil.exe and bitsadmin.exe downloading files in that KQL query. We've observed actors using those for staging payloads instead of straight PowerShell to evade EDR hooks.

SC
SCADA_Guru_Ivan5/1/2026

From the MSP side, we manage a few smaller news bureaus in the region, and the volume of spear-phishing has jumped noticeably this month. The lures are getting incredibly convincing—often disguised as 'official' diplomatic cables or press invites. We've started enforcing strict Macro signing and ATP Safe Links to cut down the blast radius.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created5/1/2026
Last Active5/1/2026
Replies2
Views143