China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration

Share:

A previously undocumented threat actor called CeranaKeeper has been linked to a string of data exfiltration attacks targeting Southeast Asia.

Slovak cybersecurity firm ESET, which observed campaigns targeting governmental institutions in Thailand starting in 2023, attributed the activity cluster as aligned to China, leveraging tools previously identified as used by the Mustang Panda actor.

“The group constantly updates its backdoor to evade detection and diversifies its methods to aid massive data exfiltration,” security researcher Romain Dumont said in an analysis published today.

“CeranaKeeper abuses popular, legitimate cloud and file-sharing services such as Dropbox and OneDrive to implement custom backdoors and extraction tools.”

Some of the other countries targeted by the adversary include Myanmar, the Philippines, Japan, and Taiwan, all of which have been targeted by Chinese state-sponsored threat actors in recent years.

ESET described CeranaKeeper as relentless, creative, and capable of swiftly adapting its modus operandi, while also calling it aggressive and greedy for its ability to move laterally across compromised environments and hoover as much information as possible via various backdoors and exfiltration tools.

“Their extensive use of wildcard expressions for traversing, sometimes, entire drives clearly showed their aim was massive data siphoning,” the company said.

The exact initial access routes employed by the threat actor remain unknown as yet. However, a successful initial foothold is abused to gain access to other machines on the local network, even turning some of the compromised machines into proxies or update servers to store updates for their backdoor.

The attacks are characterized by the use of malware families such as TONESHELL, TONEINS, and PUBLOAD – all attributed to the Mustang Panda group – while also making use of an arsenal of never-before-seen tools to aid data exfiltration.

“After gaining privileged access, the attackers installed the TONESHELL backdoor, deployed a tool to dump credentials, and used a legitimate Avast driver and a custom application to disable security products on the machine,” Dumont said.

“From this compromised server, they used a remote administration console to deploy and execute their backdoor on other computers in the network. Additionally, CeranaKeeper used the compromised server to store updates for TONESHELL, turning it into an update server.”

The newly discovered custom toolset is as follows –

  • WavyExfiller – A Python uploader that harvests data, including connected devices like USBs and hard drives, and uses Dropbox and PixelDrain as exfiltration endpoints
  • DropboxFlop – A Python DropboxFlop that’s a variant of a publicly-available reverse shell called DropFlop that comes with upload and download features and uses Dropbox as a command-and-control (C&C) server
  • OneDoor – A C++ backdoor that abuses Microsoft OneDrive REST API to receive commands and exfiltrate files
  • BingoShell – A Python backdoor that abuses GitHub’s pull request and issues comment features to create a stealthy reverse shell

“From a high-level point of view, [BingoShell] leverages a private GitHub repository as a C&C server,” ESET explained. “The script uses a hard-coded token to authenticate and the pull requests and issues comments features to receive commands to execute and send back the results.”

Calling out CeranaKeeper’s ability to quickly write and rewrite its toolset as required to evade detection, the company said the threat actor’s end goal is to develop bespoke malware that can allow it to collect valuable information on a large scale.

“Mustang Panda and CeranaKeeper seem to operate independently of each other, and each has its own toolset,” it said. “Both threat actors may rely on the same third party, such as a digital quartermaster, which is not uncommon among China-aligned groups, or have some level of information sharing, which would explain the links that have been observed.”

Ravie Lakshmanan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
5:00 am, Jul 1, 2025
weather icon 22°C
L: 21° | H: 23°
few clouds
Humidity: 77 %
Pressure: 1014 mb
Wind: 3 mph ENE
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 24%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:47 am
Sunset: 9:20 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
21° | 23°°C 0 mm 0% 11 mph 73 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
19° | 24°°C 0.2 mm 20% 12 mph 76 % 1024 mb 0 mm/h
Thu Jul 03 10:00 pm
weather icon
14° | 26°°C 0 mm 0% 8 mph 52 % 1029 mb 0 mm/h
Fri Jul 04 10:00 pm
weather icon
16° | 29°°C 0 mm 0% 10 mph 48 % 1027 mb 0 mm/h
Sat Jul 05 10:00 pm
weather icon
17° | 22°°C 0.2 mm 20% 13 mph 81 % 1019 mb 0 mm/h
Today 7:00 am
weather icon
22° | 22°°C 0 mm 0% 3 mph 73 % 1014 mb 0 mm/h
Today 10:00 am
weather icon
26° | 28°°C 0 mm 0% 2 mph 54 % 1014 mb 0 mm/h
Today 1:00 pm
weather icon
31° | 31°°C 0 mm 0% 7 mph 31 % 1013 mb 0 mm/h
Today 4:00 pm
weather icon
32° | 32°°C 0 mm 0% 9 mph 25 % 1012 mb 0 mm/h
Today 7:00 pm
weather icon
28° | 28°°C 0 mm 0% 11 mph 31 % 1013 mb 0 mm/h
Today 10:00 pm
weather icon
25° | 25°°C 0 mm 0% 8 mph 48 % 1015 mb 0 mm/h
Tomorrow 1:00 am
weather icon
22° | 22°°C 0 mm 0% 6 mph 65 % 1015 mb 0 mm/h
Tomorrow 4:00 am
weather icon
19° | 19°°C 0 mm 0% 6 mph 76 % 1016 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€90,956.47
-1.24%
Ethereum(ETH)
€2,109.22
-0.61%
Tether(USDT)
€0.85
0.00%
XRP(XRP)
€1.90
1.78%
Solana(SOL)
€130.57
1.35%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.139855
-1.57%
Shiba Inu(SHIB)
€0.000009
-1.85%
Pepe(PEPE)
€0.000008
-3.94%
Scroll to Top