PULSE NAME
An Investigation Into Years of Undetected Operations Targeting High-Value Sectors
WHITE CL-UNK-1068 AlienVault 2026-03-06 Modified: 2026-04-05
44
IOCs
MEDIUM VOLUME
Since 2020, a Chinese threat actor dubbed CL-UNK-1068 has been targeting high-value organizations across South, Southeast and East Asia, focusing on critical sectors like aviation, energy, government, and telecommunications. The group employs a diverse toolkit including custom malware, modified open-source utilities, and living-off-the-land binaries to maintain stealthy persistence. Their techniques involve web shell deployment, DLL side-loading attacks, and credential theft. The attackers exfiltrate sensitive data, including configuration files and database backups. While primarily assessed as an espionage operation, cybercriminal motivations cannot be fully ruled out. The activity demonstrates sophisticated cross-platform capabilities, targeting both Windows and Linux environments.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
GodZilla AntSword Xnote Fast Reverse Proxy ScanPortPlus SuperDump Sliver
Indicators of Compromise (6 / 44 total)
All CVE FileHash-MD5 FileHash-SHA1 FileHash-SHA256
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 0579c97136b75a3a60423af72f5d0ab1 2026-03-06
FileHash-MD5 153de64a0649787191367d65727db9e5 2026-03-06
FileHash-MD5 19d0db9625256adfc1068de9f5c4ad12 2026-03-06
FileHash-MD5 30833ab8ac0c794a3806dbe7c94eaddd 2026-03-06
FileHash-MD5 bb49d3ff670c3583955d2732ba7d78e0 2026-03-06
FileHash-MD5 e1cdaa62c9def1e02d46dfa061b96ec5 2026-03-06