Security researchers at Check Point Research have attributed a series of cyber espionage campaigns targeting Southeast Asian governments to a previously undocumented threat cluster called Amaranth-Dragon. The group shares significant links with the APT41 ecosystem and has been exploiting a WinRAR vulnerability (CVE-2025-8088) since shortly after its public disclosure.

Campaign overview

AttributeDetails
Threat actorAmaranth-Dragon
AttributionChina-linked (APT41 ecosystem)
Activity periodThroughout 2025, ongoing into 2026
Primary targetsGovernment, law enforcement
Target regionsCambodia, Thailand, Laos, Indonesia, Singapore, Philippines
Exploit usedCVE-2025-8088 (WinRAR path traversal)
PayloadHavoc Framework
DiscoveryCheck Point Research

Targeted countries

CountrySectors targeted
CambodiaGovernment
ThailandGovernment, law enforcement
LaosGovernment
IndonesiaGovernment
SingaporeGovernment
PhilippinesGovernment, law enforcement

CVE-2025-8088: WinRAR path traversal

The attackers weaponized a WinRAR vulnerability disclosed in August 2025:

AttributeValue
CVECVE-2025-8088
Disclosure dateAugust 8, 2025
TypePath traversal
ImpactArbitrary code execution
PlatformWindows
Exploitation methodMalicious RAR file drops executable to Startup folder

Exploitation timeline

DateEvent
August 8, 2025CVE-2025-8088 publicly disclosed
August 14, 2025Public exploit tool released on GitHub
August 18, 2025Amaranth-Dragon first observed using the exploit

The attackers weaponized the vulnerability within 10 days of its disclosure and just 4 days after a public exploit tool became available.

How the exploit works

StepAction
1Victim receives malicious RAR archive
2Archive crafted with path traversal payload
3Upon extraction, file dropped to Windows Startup folder
4Malicious file executes automatically on system reboot
5DLL sideloading initiates infection chain

By dropping files into the Startup folder, attackers achieve indirect code execution without requiring the victim to explicitly run a malicious executable.

Attack methodology

Social engineering lures

Amaranth-Dragon crafted highly targeted lures timed to coincide with significant local events:

Lure typePurpose
Political developmentsExploit current events for credibility
Government decisionsTarget officials following specific announcements
Regional security eventsAppeal to defense and security personnel

“Many of the campaigns were timed to coincide with sensitive local political developments, official government decisions, or regional security events,” increasing the likelihood that targets would engage with the content.

Operational discipline

PatternImplementation
Narrow targetingOne or two countries per operation
Custom luresLocalized content for each target
No mass distributionIndividual targeting over spray-and-pray
Event timingCampaigns aligned with news cycles

Technical analysis

Amaranth Loader

The primary tool, dubbed Amaranth Loader, is a malicious DLL delivered via DLL sideloading:

CharacteristicDetails
DeliveryDLL sideloading
EncryptionAES-encrypted payload
ExecutionIn-memory decryption and execution
Final payloadHavoc Framework implant

Similarities to APT41 tooling

Check Point identified significant overlaps with established APT41 tools:

ToolConnection
DodgeBoxSimilar loading techniques
DUSTPAN (StealthVector)Code structure similarities
DUSTTRAPDevelopment patterns

Development patterns

EvidenceImplication
Thread creation in export functionsMatches APT41 coding style
Compilation timestampsUTC+8 timezone (China Standard Time)
Campaign timingConsistent with working hours in CST
Infrastructure managementProfessional, disciplined approach

Check Point noted: “The development style, such as creating new threads within export functions to execute malicious code, closely mirrors established APT41 practices.”

Havoc Framework

The final payload is the Havoc Framework, an open-source command-and-control platform:

AttributeDetails
TypeOpen-source C2 framework
LanguageC/C++
CapabilitiesFull remote access
EvasionDesigned for red team operations

Havoc capabilities

CapabilityDescription
Command executionRun arbitrary commands
File operationsUpload, download, modify files
Process managementList, spawn, terminate processes
Credential accessDump credentials
Lateral movementPivot to other systems
PersistenceMaintain access

Using an open-source framework provides attackers with deniability—the same tool is used by legitimate penetration testers and other threat actors.

APT41 connection

Amaranth-Dragon’s links to APT41 stem from multiple factors:

Evidence typeDetails
Malware arsenalOverlapping tools and techniques
Development styleConsistent coding patterns
Infrastructure managementSimilar operational practices
TargetingAligned with Chinese strategic interests

APT41 background

AttributeDetails
Also known asWinnti, Wicked Panda, BARIUM, Double Dragon
AttributionChinese state-sponsored + financially motivated
Active sinceAt least 2012
Dual missionEspionage and cybercrime

APT41 is notable for conducting both state-sponsored espionage and financially motivated cybercrime—sometimes simultaneously. The group has targeted healthcare, telecom, technology, gaming, and government sectors globally.

Shared resources

Check Point noted: “It’s worth noting that Chinese threat actors are known for sharing tools, techniques, and infrastructure.” This sharing makes attribution challenging but also reveals connections between seemingly distinct operations.

Indicators of compromise

Network indicators

Amaranth-Dragon infrastructure details are available in Check Point’s technical report. Organizations in targeted regions should review the full IOC list.

Behavioral indicators

  • RAR files extracting executables to Startup folder
  • DLL sideloading from user directories
  • Havoc Framework C2 communication patterns
  • AES-encrypted payloads in memory

Detection opportunities

IndicatorDetection method
Path traversal in RAR extractionFile integrity monitoring
Startup folder modificationsWindows event logs
DLL sideloadingProcess monitoring
Havoc C2 trafficNetwork detection signatures

Recommendations

For organizations in targeted regions

PriorityAction
CriticalUpdate WinRAR to latest version
CriticalMonitor for CVE-2025-8088 exploitation attempts
HighReview Startup folder for unexpected executables
HighDeploy detection for Amaranth Loader and Havoc
HighBrief staff on current social engineering themes
MediumCoordinate with national CERTs on threat intelligence

For all organizations

PriorityAction
HighEnsure WinRAR is updated across all endpoints
HighConsider application control for archive extraction
MediumMonitor for DLL sideloading techniques
OngoingTrack Chinese APT activity relevant to your sector

Patch verification

WinRAR versionStatus
< 6.23Vulnerable
6.23+Patched

Regional context

Southeast Asia represents a consistent target for Chinese cyber espionage:

FactorSignificance
South China Sea tensionsMaritime and territorial disputes
ASEAN political dynamicsRegional influence competition
Infrastructure projectsBelt and Road Initiative
Technology accessTelecommunications, critical infrastructure
Government intelligencePolicy insights

Amaranth-Dragon’s focus on government and law enforcement agencies aligns with intelligence collection supporting Chinese regional interests.

Context

Amaranth-Dragon demonstrates the continued evolution of Chinese-linked threat actors targeting Southeast Asia. The group’s rapid exploitation of CVE-2025-8088—within 10 days of disclosure—shows sophisticated vulnerability monitoring and rapid weaponization capabilities.

PatternAmaranth-Dragon
Vulnerability exploitationRapid weaponization
TargetingHighly selective, event-driven
ToolsMix of custom and open-source
OperationsDisciplined, professional
Attribution linksAPT41 ecosystem

The campaign’s operational discipline—narrow targeting, customized lures, and timing aligned with local events—indicates a well-resourced team with regional expertise and specific intelligence requirements.

Organizations in Southeast Asia, particularly government and law enforcement agencies, should assume they are targets for Chinese cyber espionage and implement appropriate detection and defense capabilities.