Threat Intelligence 7 min read

Three Chinese APT Clusters Hit One Government: What It Means

Kyanite Blue Labs, Threat Intelligence·31 March 2026

One Target, Three Threat Groups

Security researchers have identified a campaign in which three separate threat activity clusters, each aligned with Chinese state interests, simultaneously targeted a single government organisation in Southeast Asia. The operation has been described as complex and well-resourced — which is significant, because it suggests these groups were either formally coordinated or operating under a shared tasking directive from a central authority. This is not the typical model for APT activity. Most attributed campaigns involve a single threat actor working a target over an extended period. Three distinct clusters converging on the same entity, deploying different toolsets in parallel, points to something more deliberate: a coordinated intelligence collection operation where each cluster likely played a specific role in access, persistence, or exfiltration. For security teams, this matters beyond the geopolitical context. It is a demonstration of how layered and redundant advanced persistent threat operations have become — and why a single defensive control is rarely sufficient against a determined state-level adversary.

What Malware Was Deployed and How It Works

The campaign involved multiple distinct malware families, each serving a specific function in the attack chain. Understanding what was deployed helps explain how attackers maintained access, moved laterally, and extracted data over what was likely an extended period of compromise. HIUPAN (also tracked as USBFect, MISTCLOAK, and U2DiskWatch) is a worm that spreads via USB storage devices. Its presence in the campaign is telling — USB-borne malware is typically used to bridge air-gapped or network-segmented environments, which suggests the attackers needed to reach systems intentionally isolated from the internet. PUBLOAD is a stager, a piece of malware designed to load additional payloads once initial access is established. It acts as a bridge between initial compromise and full backdoor deployment, making it harder to detect because it does not carry a visible malicious payload on its own. EggStremeFuel (RawCookie) and EggStremeLoader (Gorem RAT) form a loader-and-backdoor pairing. The loader executes the remote access trojan, which gives attackers persistent, interactive access to compromised systems. MASOL RAT, another component identified in the campaign, has previously been associated with Linux backdoor activity targeting government networks in Southeast Asia.

  • HIUPAN: USB worm used to cross air-gapped network segments
  • PUBLOAD: stager that prepares systems for full backdoor deployment
  • EggStremeFuel / EggStremeLoader: loader and RAT pairing for persistent access
  • MASOL RAT: Linux-compatible backdoor with prior history in regional government targeting

Why Three Groups? The Logic of Parallel Operations

The involvement of three distinct clusters in a single campaign is the detail that should receive the most attention from threat intelligence practitioners. Chinese state-sponsored cyber operations are typically compartmentalised. Different groups operate under different PLA or MSS-aligned structures, and tasking is rarely ad hoc. When multiple clusters converge on the same target, it usually indicates that the intelligence value of that target justified redundant access — meaning if one cluster was detected and expelled, the others could maintain a foothold. This is operational security thinking applied to offensive cyber. The attackers were not just trying to get in; they were trying to stay in, regardless of partial detection. For defenders, this means that evicting one attacker and declaring the incident closed is a dangerous assumption. Full-scope incident response needs to account for the possibility of parallel, independently maintained access paths. It also complicates attribution. When different toolsets are deployed by different clusters, defenders may identify and respond to one intrusion set without recognising that others are active on the same network, using different infrastructure and different techniques.

What Does This Mean for UK and ANZ Organisations?

The immediate target was a Southeast Asian government entity, but the lessons apply broadly. UK government agencies, defence supply chain contractors, and critical national infrastructure operators face the same category of threat from the same actors. Chinese APT groups do not limit their operations to one region — they operate globally, and their targeting follows geopolitical and economic intelligence priorities. For organisations in New Zealand and Australia, this campaign reinforces a threat picture that the Australian Signals Directorate (ASD) and New Zealand's National Cyber Security Centre (NCSC) have both flagged in recent years. The AUKUS partnership and regional security dynamics make ANZ government and defence-adjacent organisations realistic targets for exactly this kind of long-duration intelligence collection operation. The use of USB-propagating malware like HIUPAN is also worth flagging for any organisation that operates in environments with strict network segmentation — including utilities, defence contractors, and government agencies. Segmentation reduces risk but does not eliminate it when physical media can bridge the gap. For organisations managing third-party suppliers and contractors, campaigns like this highlight why supply chain visibility is not optional. A compromised supplier with access to your network is an access vector, regardless of your own internal controls. Panorays, which Kyanite Blue offers for third-party supply chain risk management, exists precisely to surface that exposure before it becomes an incident.

Where Standard Defences Fall Short

The architecture of this campaign — multiple threat clusters, varied malware families, USB propagation, and long-dwell persistence — is designed to defeat the controls most organisations rely on. Signature-based endpoint detection struggles against custom malware like MASOL RAT and loader combinations such as PUBLOAD and EggStremeFuel, particularly when these tools are actively maintained and updated to evade known detection patterns. Perimeter controls do not help once a USB device has been used to bridge a segmented environment. And traditional incident response models, which treat an intrusion as a single event with a clear beginning and end, are poorly suited to campaigns that use redundant access paths. The data exfiltration component is particularly relevant here. State-sponsored intrusions at this level are almost always about data collection — strategic intelligence, diplomatic communications, military procurement information, personnel records. Once data leaves the network, the damage is done regardless of how quickly the attacker is evicted. Anti-data exfiltration controls that prevent unauthorised data movement in real time, rather than detecting it after the fact, are directly relevant to this threat model. BlackFog, which Kyanite Blue deploys for exactly this purpose, operates at the data layer to stop exfiltration attempts before data reaches an attacker-controlled destination. Attack surface management is the other gap this campaign exposes. Organisations often do not have a complete picture of their external-facing assets, let alone the exposure that contractor and supplier connections introduce. Hadrian provides continuous, AI-driven attack surface visibility — the kind of always-on reconnaissance that tells you what an attacker can see before they decide to act on it.

Building a Defence Against Multi-Cluster APT Operations

Defending against a coordinated, multi-cluster APT campaign is not a single-product problem. It requires layered controls that work across endpoint, network, data, and third-party risk domains — and it requires the operational capacity to detect and respond to threats that may be active for months before they are identified. Here is what that looks like in practice: First, endpoint detection needs to go beyond signatures. Behavioural detection that identifies anomalous process execution, lateral movement, and persistence mechanisms catches what signature-based tools miss. ESET's enterprise endpoint protection, deployed across Kyanite Blue's ANZ customer base, includes behaviour-based detection specifically designed for advanced threat actors. Second, 24/7 monitoring matters. APT groups operate continuously, including outside business hours when internal security teams are not watching. Sophos MDR provides round-the-clock managed detection and response, with human analysts reviewing alerts and escalating confirmed threats — closing the window that attackers rely on. Third, data exfiltration controls need to sit at the data layer, not just the network perimeter. BlackFog's anti-data exfiltration capability stops data movement to unauthorised destinations regardless of the protocol used, which is directly relevant to a campaign designed around data collection. Fourth, supply chain risk needs active management. Panorays continuously monitors the security posture of third-party suppliers and flags changes that could introduce exposure into your environment. Fifth, know your attack surface. Hadrian maps your external exposure continuously, giving security teams the visibility to identify and remediate targets before attackers exploit them.

  • Deploy behavioural endpoint detection capable of identifying custom malware and lateral movement
  • Implement 24/7 managed detection and response to close the out-of-hours window
  • Add anti-data exfiltration controls at the data layer, not just the network perimeter
  • Monitor third-party supplier security posture continuously, not just at onboarding
  • Maintain continuous attack surface visibility across all external-facing assets and connections

The Broader Pattern

This campaign is one data point in a consistent pattern. Chinese state-sponsored threat groups have been conducting long-duration intrusions against government, defence, and critical infrastructure targets across Asia-Pacific and beyond for over a decade. What has changed is the operational sophistication — the use of multiple coordinated clusters, purpose-built malware for specific environments, and redundant access mechanisms designed to survive partial detection. The 2025 Southeast Asia campaign, reported by The Hacker News, is a direct demonstration of where this threat has arrived. Defenders who are still planning around single-actor, perimeter-focused models are behind the threat curve. At Kyanite Blue Labs, we track campaigns like this because they define the conditions our customers are operating in. The tools, techniques, and infrastructure used in state-sponsored operations do not stay contained to their original targets — they migrate, get repurposed, and eventually appear in campaigns against less-resourced organisations that were never the primary target but end up compromised anyway. If you want to understand how your current security posture maps against this threat model, contact Kyanite Blue for a structured assessment.

Frequently Asked Questions

What is a multi-cluster APT campaign and why is it more dangerous?

A multi-cluster APT campaign involves multiple distinct threat groups, typically state-aligned, targeting the same organisation simultaneously. Each cluster operates independently with its own tools and infrastructure. This creates redundant access paths, meaning defenders who detect and remove one intruder may not realise others remain active on the same network.

How does USB-based malware like HIUPAN bypass network security controls?

HIUPAN spreads via USB storage devices rather than network connections, which allows it to bridge air-gapped or segmented environments that have no internet exposure. An employee or contractor using an infected USB drive can introduce malware into an otherwise isolated system, bypassing firewalls, email filters, and network-based detection entirely.

What security controls are most effective against state-sponsored data exfiltration?

Anti-data exfiltration tools that operate at the data layer — blocking unauthorised data movement in real time regardless of protocol — are most effective. Perimeter controls alone are insufficient once an attacker has internal access. Complementary measures include behavioural endpoint detection, 24/7 managed response, and continuous third-party risk monitoring to eliminate indirect access paths.

APTChinastate-sponsored threatsgovernment cyber attacksmalware

Want to discuss this with our team?

Book a free 20-minute call with David or Max.

Book a call