5 Shocking Ways Chinese Hackers Employ Upgraded RAT Malware Against Russia

Introduction

The craft of cyber espionage reaches new heights as Chinese-speaking IronHusky hackers deploy the sophisticated MysterySnail remote access trojan (RAT) to infiltrate Russian and Mongolian government organizations. This upgraded digital weapon system not only breaches security perimeters but also executes complex espionage operations with chilling efficiency.

The Upgraded MysterySnail RAT: A Threat Revisited

Top-caliber security sleuths from Kaspersky’s Global Research and Analysis Team (GReAT) unearthed this enhanced threat. The hackers cleverly masked their RAT deployment via a seemingly innocuous MMC script disguised as a Word document, setting the stage for subsequent payload downloads and ensuring their malignant stay within the compromised systems.

Key Payload Capabilities

  • File transfer between control servers and victim devices
  • Execution of command shells
  • Creation and termination of processes
  • File management

Resilience of MysterySnail RAT

Despite rigorous countermeasures that momentarily halted the intrusions, attackers rapidly countered with a novel, stripped-down iteration of the RAT, named MysteryMonoSnail, signifying their relentless pursuit to dominate the digital battleground.

The revamped RAT commands a formidable array of functionalities, enabling the remote administration of affected devices and paving the way for extensive control over compromised systems.

Historical Insights and Evolution

The malicious potency of the MysterySnail RAT was first recognized by Kaspersky in late August 2021 during extensive espionage campaigns targeting vital sectors across Russia and Mongolia.

Noteworthy Exploits Used:

  • Zero-day exploits in a Windows kernel driver (CVE-2021-40449) initially leveraging the malware
  • Exploitation of a Microsoft Office memory corruption vulnerability (CVE-2017-11882) for spreading various RATs typical in Chinese cyber arsenals

Continued Vigilance and Advanced Preparation

The repeated and evolved use of the MysterySnail RAT signal a clear message; the landscape of cyber threats remains volatile and demands constant vigilance and adaptation. Organizations across the globe, particularly those within the governmental and defense sectors, are urged to fortify their defenses and stay prepared against such insidious threats.

Further Information

For additional insights into the tactics, techniques, and procedures of the IronHusky group and detailed technical indicators of compromise, refer to Kaspersky’s recently published report which serves as a crucial resource in understanding and mitigating these sophisticated threats.

Related: How to Build a Security Champions Program Within Your Organization

Last Updated: April 18, 2025