Sunday, September 28, 2025

Lotus Blossom Deploys New Malware in South China Sea Attacks

A sophisticated cyber-espionage group known as Lotus Blossom is escalating its attacks in the South China Sea, targeting government, media, and telecom organizations. According to a new report from Cisco Talos, the group is using an advanced backdoor malware called Sagerunex. This campaign highlights a persistent and evolving threat focused on intelligence gathering in a region of high geopolitical tension.

A Decade-Old Threat Re-emerges with New Tricks

Lotus Blossom is not a new player in the world of cyber espionage. The group has been active for over a decade, first appearing around 2012. Security researchers track it under several names, including Spring Dragon and Billbug.

While its exact origins are unconfirmed, its activities consistently focus on specific targets. The group has a history of targeting entities in the Philippines, Vietnam, Hong Kong, and Taiwan.

This long-term operation shows the group’s dedication and resources. Lotus Blossom is demonstrating significant persistence and adaptability by continuously updating its tools and techniques to evade modern cybersecurity defenses. Its focus on politically sensitive regions suggests a mission driven by state-level interests.

How the Sagerunex Malware Infiltrates Systems

The primary tool in these recent attacks is Sagerunex, a powerful Remote Access Tool (RAT) that has been in development since at least 2016. It is specifically designed for stealth, often being injected directly into a system’s memory to make it harder for antivirus software to find.

The attack is methodical and unfolds in several stages to ensure deep access and control over the compromised network.

  1. First, the attackers check if the infected computer has an active internet connection.
  2. If it does, the Sagerunex malware is deployed to establish a connection with the operators.
  3. If internet access is restricted, a proxy tool named Venom is used to create a tunnel out of the network.
  4. Once inside, the malware steals browser cookies, gains higher user privileges, and opens command shells for remote control.
  5. Finally, it uses compression tools to package stolen data before sending it back to the attackers.

This systematic, multistage attack process allows Lotus Blossom to carefully steal data while remaining hidden for long periods.

Using Trusted Cloud Services for Stealthy Attacks

Recent analysis has uncovered two new versions of Sagerunex that use clever methods to hide their communications. These variants abuse legitimate and widely trusted cloud services to send and receive commands, making their malicious traffic look like normal user activity.

This technique allows the malware to bypass traditional security firewalls, which are often configured to trust traffic from popular platforms. One variant uses Dropbox and Twitter, while the other uses the Zimbra email service.

Variant FeatureVariant 1Variant 2
Communication MethodDropbox & Twitter APIsZimbra Email Service
Primary PurposeCommand and Control (C2)Data Exfiltration
Platform TypeCloud Storage & Social MediaLegitimate Mail Server

By hiding in plain sight, Lotus Blossom significantly increases its chances of a successful attack.

Implications for Security in the South China Sea

The choice of targets is very telling. By focusing on government agencies, media outlets, and telecommunications companies, the group’s goal is clearly not financial. Instead, this points toward a large-scale intelligence-gathering mission.

These types of operations are often the work of state-backed actors seeking strategic advantages related to political, economic, or military intelligence.

Organizations in the targeted regions must assume they are at high risk. The ongoing development of Sagerunex and other tools proves that Lotus Blossom remains a potent and evolving cyber threat. Adopting advanced threat detection and response strategies is now more critical than ever to defend against these sophisticated attacks.

James Lee
James Leehttp://studioonenetworks.com
James Lee is a seasoned blogger and a versatile writer known for his storytelling skills and attention to detail. With a background in journalism, he has developed his writing expertise across various subjects, including digital marketing, technology, and SEO. With a unique voice and a great sense of humor, he is always looking to connect with his readers and share his ideas.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Recent

More like this
Related

How to Get the Senior Discount for Amazon Prime Membership

Amazon Prime offers incredible convenience with its free shipping,...

How to Become an Amazon Delivery Driver: a Complete Guide

You can become an Amazon delivery driver by meeting...

China’s Underground Raves: a Secret Space for Youth Freedom

In the city of Changchun, China, a different kind...

How to Complain About an Amazon Driver for a Quick Resolution

When your Amazon package arrives late, damaged, or is...