• 2025.09.10 (Wed)
  • All articles
  • LOGIN
  • JOIN
Global Economic Times
APEC2025KOREA가이드북
  • Synthesis
  • World
  • Business
  • Industry
  • ICT
  • Distribution Economy
  • Korean Wave News
  • Opinion
  • Arts&Culture
  • Sports
  • People & Life
  • Lee Yeon-sil Column
  • Ko Yong-chul Column
  • Photo News
  • New Book Guide
  • Cherry Garden Story
MENU
 
Home > Synthesis

Nation-backed threat group 'MirrorFace' targets Japanese and Taiwanese government agencies with cyber espionage, utilizing new ROAMINGMOUSE and enhanced ANEL malware

ONLINE TEAM / Updated : 2025-05-09 12:29:19
  • -
  • +
  • Print

A nation-backed cyber threat group known as 'MirrorFace' has been detected conducting cyber espionage activities targeting government and public institutions in Japan and Taiwan, deploying a new malware strain called 'ROAMINGMOUSE'.

Global cybersecurity firm Trend Micro detected MirrorFace's attack campaign in March 2025, revealing that the group distributed an updated version of a backdoor referred to as 'ANEL' through targeted spear-phishing attacks.

Trend Micro security researcher Hara Hiroaki analyzed that "The ANEL file discovered in this 2025 campaign implemented a new command to support Beacon Object File (BOF) execution within memory," and added, "There's a potential that this campaign leveraged a tool called 'SharpHide' to execute the second-stage backdoor, 'NOOPDOOR'."

This China-based threat group, also known as 'Earth Kasha', is assessed to be a subgroup of APT10. Previously, in March 2025, another cybersecurity firm, ESET, reported that an EU diplomatic organization was targeted in August 2024 with the ANEL (aka UPPERCUT) malware through a campaign named 'Operation AkaiRyū'.

The current activities targeting various institutions in Japan and Taiwan indicate a continuous expansion of MirrorFace's cyberattack scope. It is analyzed that this hacking group is actively engaged in information theft to achieve their strategic objectives.

The attacks commence with spear-phishing emails, some of which are confirmed to have been sent from legitimately compromised accounts. These emails contain malicious Microsoft OneDrive URLs, and clicking them leads to the download of a ZIP file.

The ZIP archive contains a malicious Excel document and a macro-based downloader codenamed 'ROAMINGMOUSE'. ROAMINGMOUSE serves as a conduit for delivering ANEL-related components and has a history of being used by MirrorFace since the previous year.

Researcher Hara Hiroaki explained, "ROAMINGMOUSE decodes an embedded ZIP file using Base64 encoding, drops the ZIP file onto the disk, and then decompresses it." The list of decompressed files is as follows:

JSLNTOOL.exe, JSTIEE.exe, or JSVWMNG.exe (legitimate executable files)
JSFC.dll (ANELLDR)
An encrypted ANEL payload
MSVCR100.dll (a normal DLL dependency file for the executable)
The final objective of the attack chain is to execute a legitimate executable file using explorer.exe, which then loads the malicious DLL file, ANELLDR. ANELLDR is responsible for decrypting and executing the ANEL backdoor.

A notable feature of the ANEL malware used in the 2025 campaign is the addition of a new command that supports the in-memory execution of BOF (Beacon Object File). BOFs are compiled C programs designed to extend the capabilities of Cobalt Strike agents, allowing attackers to perform additional post-exploitation activities on compromised systems.

Trend Micro stated, "After installing the ANEL file, the attackers behind Earth Kasha used backdoor commands to obtain screenshots and investigate the victim's environment." They added, "The attackers appear to be conducting reconnaissance on the compromised system by reviewing screenshots, checking the process list, and querying domain information."

In some instances, there were also indications of the open-source tool 'SharpHide' being utilized to execute a new version of 'NOOPDOOR' (aka HiddenFace), another backdoor previously linked to this hacking group. NOOPDOOR features support for DNS-over-HTTPS (DoH) to conceal IP address lookups during command and control (C2) communication. This suggests that the attackers are continuously developing their techniques to evade detection.

Researcher Hara Hiroaki warned, "Earth Kasha remains an actively operating advanced persistent threat (APT) group and is targeting government and public institutions in Taiwan and Japan in its latest campaign detected in March 2025."

He further emphasized, "Companies and institutions, especially those holding high-value assets such as government-related sensitive data, intellectual property, infrastructure data, and access credentials, must continuously strengthen their vigilance and implement proactive security measures to avoid becoming victims of cyberattacks."

Additional Information:

APT10 (Stone Panda): Assessed to be the parent group of MirrorFace, APT10 is a long-standing China-based cyber espionage group primarily involved in information theft targeting various industries, including government, telecommunications, aerospace, and energy. They are notorious for employing sophisticated attack techniques and concealment methods.
Spear Phishing: A targeted attack technique that focuses on specific individuals or organizations, using emails disguised with content that appeals to their interests to distribute malware or steal critical information. Its higher success rate compared to general phishing makes it a frequent tool for APT groups.
Backdoor: A covertly installed entry point that bypasses normal authentication procedures, allowing unauthorized access to a system. Attackers can use backdoors to remotely control compromised systems and conduct further malicious activities.
Cobalt Strike: A legitimate penetration testing tool widely used but also exploited by attackers to generate malicious payloads, establish C2 communication, and perform post-exploitation activities. BOF is an object file format used to extend Cobalt Strike's functionality.
DNS-over-HTTPS (DoH): A protocol that encrypts DNS queries over HTTPS connections. This can help attackers obscure their C2 server communication and evade network traffic analysis-based detection.
SharpHide: An open-source tool used to conceal processes on Windows operating systems. Attackers can leverage this to hide malicious processes and evade detection.
NOOPDOOR (HiddenFace): Another backdoor malware known to be used by MirrorFace, featuring stealth capabilities and C2 communication functionalities. Its use of DoH to hide communication is a notable characteristic.
MirrorFace's recent activities underscore the ongoing prevalence of nation-state cyber espionage and the continuous development of new techniques and tactics by attackers to breach defenses. Particularly, Japan and Taiwan, due to their geopolitically sensitive locations, are likely to remain prime targets for nation-backed threat groups.

Consequently, government and public institutions, as well as private enterprises, must heighten their awareness of cybersecurity threats, continuously monitor the latest threat intelligence, and implement enhanced security measures. It is crucial to adhere strictly to basic security practices, such as avoiding opening suspicious email attachments or links and refraining from executing programs from unknown sources. Furthermore, proactive security investments, including the adoption of a Zero Trust architecture, implementation of Multi-Factor Authentication (MFA), application of the latest security patches, and strengthening of Intrusion Detection and Prevention Systems, are necessary to enhance the ability to respond to cyberattacks.

[Copyright (c) Global Economic Times. All Rights Reserved.]

  • #NATO
  • #OTAN
  • #OECD
  • #G20
  • #globaleconomictimes
  • #Korea
  • #UNPEACEKOR
  • #micorea
  • #mykorea
  • #newsk
  • #UN
  • #UNESCO
  • #nammidongane
ONLINE TEAM
ONLINE TEAM
Reporter Page

Popular articles

  • AI Boom Fuels Memory Market Growth

  • South Korea's "Labor Police" Initiative Sparks Debate: Is It About Safety or Punishment?

  • Egypt's Automotive Sector Accelerates Towards a Manufacturing-Led Future

I like it
Share
  • Facebook
  • X
  • Kakaotalk
  • LINE
  • BAND
  • NAVER
  • https://globaleconomictimes.kr/article/1065583708179399 Copy URL copied.
Comments >

Comments 0

Weekly Hot Issue

  • U.S. Expresses Regret Over Israeli Airstrike in Qatar, Backs Goal of Eliminating Hamas
  • Lim Young-woong's Seoul Concert Sells Out, Proving His Immense Ticket Power
  • Samsung's AI Prowess Dominates South Korea, but Lags on the Global Stage
  • Paraguayan Ambassador to US Claims China is Attempting to Interfere in Domestic Affairs
  • “The Judiciary, Public Prosecutor's Office, and Political Sphere Have Been Captured and Subordinated”
  • Paraguay's Anti-Money Laundering Efforts: Banking Sector Sees Surge in Suspicious Transactions in 2025

Most Viewed

1
Sexual Misconduct Controversy in the Cho Kuk Innovation Party: The Repeated Lack of Self-Purification in the Political Sphere
2
Mitsubishi Pulls Out of Japanese Offshore Wind Projects Amid Soaring Costs
3
Brazil Weighs Legal Action as U.S. Tariffs Escalate Trade Tensions
4
Jung Hoo Lee's Heroics Propel Giants to Walk-Off Victory
5
US Ends 'De Minimis' Exemption Permanently, No Exceptions for Any Country
광고문의
임시1
임시3
임시2

Hot Issue

Apple Unveils 'iPhone Air,' the Thinnest iPhone Ever, Starting at ₩1.59 Million in South Korea

Samsung's AI Prowess Dominates South Korea, but Lags on the Global Stage

An infant was injured by a stone thrown by a chimpanzee at a zoo in China, sparking concern among visitors.

AI Boom Fuels Memory Market Growth

China’s online public opinion manipulation goes beyond Korea

Global Economic Times
korocamia@naver.com
CEO : LEE YEON-SIL
Publisher : KO YONG-CHUL
Registration number : Seoul, A55681
Registration Date : 2024-10-24
Youth Protection Manager: KO YONG-CHUL
Singapore Headquarters
5A Woodlands Road #11-34 The Tennery. S'677728
Korean Branch
Phone : +82(0)10 4724 5264
#304, 6 Nonhyeon-ro 111-gil, Gangnam-gu, Seoul
Copyright © Global Economic Times All Rights Reserved
  • 에이펙2025
  • 우리방송
  • APEC2025가이드북TV
Search
Category
  • All articles
  • Synthesis
  • World
  • Business
  • Industry
  • ICT
  • Distribution Economy
  • Korean Wave News
  • Opinion
  • Arts&Culture
  • Sports
  • People & Life
  • Lee Yeon-sil Column
  • Ko Yong-chul Column
  • Photo News
  • New Book Guide
  • Cherry Garden Story
  • Multicultural News
  • Jobs & Workers
  • APEC 2025 KOREA GUIDE