Chinese Spy Group Shadow-Earth-053 Exploits Exchange Flaws

China-linked APT abuses old Exchange bugs to infiltrate critical networks in Poland and Asia

Understanding Chinese Spy Group Shadow-Earth-053

Chinese spy group Shadow-Earth-053 is making headlines for exploiting Microsoft Exchange flaws to infiltrate critical networks. These cyber threats have impacted organisations in Poland, Asia, and possibly beyond. The focus keyword, ‘Chinese spy group’, highlights the ongoing risk to entities with vulnerable systems. The group has operated since late 2024, targeting government agencies, defence contractors, technology firms, and the transportation sector.

How Shadow-Earth-053 Operates: Exploiting Exchange Vulnerabilities

Shadow-Earth-053 typically gains initial access via vulnerable Microsoft Exchange Servers. The group leverages the ProxyLogon vulnerability (CVE-2021-26855) alongside other Exchange flaws (CVE-2021-26857, CVE-2021-26858, CVE-2021-27065) to achieve remote code execution. These bugs, although disclosed in 2021, remain a persistent risk for organisations that have not applied security patches.

Long-Term Persistence with ShadowPad and C2 on a Sleep Cycle

After initial compromise, Shadow-Earth-053 often waits several months before deploying ShadowPad, a custom backdoor linked to China’s APT41 and shared among various groups since 2019. This approach enables stealthy, long-term access, with command-and-control (C2) infrastructure that operates on a sleep cycle. Such tactics allow the attackers to avoid detection by periodically going dormant and then reactivating, thus evading traditional security monitoring.

  • Initial access via Microsoft Exchange vulnerabilities
  • Delayed deployment of custom backdoors like ShadowPad
  • C2 infrastructure using sleep cycles to evade detection
  • Targeting sectors critical to national security and infrastructure

Why This Attack Matters: Risks and Implications for Organisations

The activities of Shadow-Earth-053 underscore the dangers posed by Chinese spy groups exploiting legacy vulnerabilities. Although no UK victims have been disclosed, the methods used are relevant to any organisation with legacy Microsoft Exchange exposure. The attackers’ ability to maintain covert access for months increases the risk of espionage, data theft, and potential sabotage if geopolitical tensions rise.

Sectoral Impact and Geopolitical Context

Victims include defence industries, ministries, technology companies, and transportation networks across eight countries, notably in Asia and Poland. The timing of these attacks, coinciding with high-profile geopolitical events such as the US-China summit, suggests strategic intent. Groups like Shadow-Earth-053, Shadow-Earth-054, Salt Typhoon, and Volt Typhoon share overlapping tactics, aiming to preposition for destructive actions should diplomatic relations deteriorate.

  • Espionage: Extraction of sensitive government and industry data
  • Sabotage: Prepositioning for disruptive or destructive attacks
  • Long-term persistence: Covert access potentially lasting months or years
  • Geopolitical risk: Increased threat during periods of international tension

How Organisations Should Respond: Practical Security Steps

Organisations must treat Chinese spy group tactics as a warning to strengthen cyber defences. The continued exploitation of Microsoft Exchange vulnerabilities demonstrates the importance of rigorous patch management and proactive threat hunting.

Patch Management and Vulnerability Assessment

Immediate action should include checking for legacy Exchange exposure and applying all relevant patches, particularly for ProxyLogon and associated bugs. Regular vulnerability assessments are essential to identify and remediate outdated systems that may be targeted by similar groups.

Threat Hunting and Incident Response

Security teams should conduct thorough threat hunting, looking for signs of ShadowPad or other custom backdoors. Monitoring for unusual network activity, especially C2 communications with sleep cycles, can help detect dormant threats. Establishing robust incident response processes ensures rapid containment and investigation if compromise is suspected.

  • Apply latest security patches to Microsoft Exchange Servers
  • Perform vulnerability assessments on legacy infrastructure
  • Conduct threat hunting for evidence of ShadowPad or similar tools
  • Monitor for suspicious C2 activity with irregular communication patterns
  • Review and update incident response plans

Security Awareness and Collaboration

Educating staff about phishing and social engineering tactics is vital, as Chinese spy groups often use these methods to complement technical exploits. Collaborate with national and sector-specific cyber security agencies for intelligence sharing and coordinated defence efforts.

Conclusion: Vigilance Against Persistent Chinese Spy Groups

Shadow-Earth-053 exemplifies the evolving tactics of Chinese spy groups targeting vulnerable organisations worldwide. Vigilance, patching, and proactive security measures are essential to defend against these sophisticated threats. Regular review of infrastructure and threat intelligence will help organisations stay ahead of persistent attackers.

Originally reported by The Register.

Share this bulletin

About the Author

Headshot of Jonny Pelter, leading cyber security expert in the UK and CISO

Jonny Pelter

Partner

  • CIPM
  • CIPP/E
  • CISSP
  • CISM
  • CRISC
  • ISO27001
  • Prince2
  • MSc
  • BSc

Jonny Pelter

Jonny is a Founding Partner at CyPro and executive group level CISO who has worked closely with the British intelligence agencies NCSC and GCHQ.

An ex-professional rugby player and originating from KPMG and Deloitte, Jonny has a wealth of experience across numerous sectors including technology, critical national infrastructure, financial services, oil & gas, insurance, betting, pharmaceuticals and utilities.

Jonny is a leading cyber security expert in the UK, having featured on national media for his professional commentary such as BBC News, iPlayer, Telegraph and Times Radio.

View Profile
Back to Bulletins
CyPro Cookie Consent

Hmmm cookies...

Our delicious cookies make your experience smooth and secure.

Privacy PolicyOkay, got it!

We use cookies to enhance your experience, analyse site traffic, and for marketing purposes. For more information on how we handle your personal data, please see our Privacy Policy.

Schedule a Call