The cyber threat group FamousSparrow has resurfaced in a coordinated set of attacks targeting a U.S. trade organization and a Mexican research institution.

This time, they’re wielding two advanced versions of their signature malwareSparrowDoor, and, for the first time, deploying the notorious ShadowPad tool a favourite among Chinese state-aligned groups.

These fresh developments signal not just the persistence of this group but also their evolving sophistication.

According to a new analysis by cybersecurity firm ESET, these latest variants demonstrate a significant technical leap in how the malware executes commands, manages system interaction, and maintains stealth within infected environments.

From Espionage to Innovation: Who Is Famous Sparrow?

FamousSparrow has been active since at least 2021, primarily targeting the hospitality sector, law firms, governments, and engineering firms.

While researchers have noted tactical overlaps with groups like GhostEmperorSalt Typhoon, and Earth Estries, FamousSparrow is believed to function independently though it shares certain infrastructure and malware design concepts with those clusters.

Their signature tool, SparrowDoor, has remained unique to the group. However, their use of ShadowPad in this new campaign raises questions about cross-group tool sharing within China’s cyber espionage ecosystem.

How the Latest Attack Worked

A Quiet Entry Point: Outdated Servers

The campaign, first observed in July 2024, took advantage of vulnerable, unpatched Windows Server and Microsoft Exchange installations.

Though the initial access vector hasn’t been fully identified, investigators traced the foothold back to a web shell deployed on an IIS server.

From there, a remote batch script was pulled down and executed, which embedded a Base64-encoded .NET shell. This shell acted as the dropper for both SparrowDoor and ShadowPad payloads.

Inside SparrowDoor’s New Capabilities

Variant One: Smarter, Faster, More Interactive

The first variant is a refined version of the original SparrowDoor with several enhancements, including:

  • Parallel command execution — the malware can now run multiple tasks at the same time
  • Improved communication with the command-and-control (C2) server
  • Thread-based architecture that spins off new connections per task, allowing better management of system instructions

This means the backdoor no longer pauses while waiting for one command to finish — it can read files, send data, and respond to the attacker’s inputs all at once.

Real-Time Instruction Handling

“Each new command spins up a thread and connects to the C2 server with a unique command ID and victim ID,” explained ESET’s researcher Alexandre Côté Cyr.

This allows the attacker to track which commands belong to which infected system, improving stealth and control during large-scale espionage operations.

Variant Two: A Modular Powerhouse

Introducing a Plugin-Based Structure

The second variant is even more impressive. It breaks from the monolithic design of traditional backdoors and instead adopts a modular format.

Think of it as a Swiss Army knife, where only the necessary tools are activated based on the attacker’s needs.

These nine modules each serve specific purposes:

ModuleFunctionality
CmdRun single shell commands
CFileFile operations (read, write, delete)
CKeylogPlugRecord every keystroke typed
CSocketAct as a TCP proxy
CShellLaunch an interactive shell for live commands
CTransfMove files to or from the infected host
CRdpTake screenshots
CProList and kill running processes
CFileMoniterWatch file changes in selected folders

This modular approach not only boosts stealth but also makes updates and retooling easier, allowing FamousSparrow to evolve without rewriting entire payloads.

ShadowPad Joins the Party

A Tool with a Shadowy Past

ShadowPad is one of the most widely used backdoors by Chinese APTs and has previously been seen in operations against telecom, transportation, and industrial targets.

Its presence in this campaign marks the first time FamousSparrow has used it, suggesting either a new partnership or deeper alignment with nation-state infrastructure.

What Makes These Attacks So Dangerous?

Multi-threaded, Modular, and Difficult to Detect

The enhancements seen in these new SparrowDoor variants make detection harder on multiple fronts:

  • Thread-based execution avoids delays and limits detection windows
  • Modular payloads reduce system footprint
  • The use of legitimate services like IIS for initial access helps blend into normal traffic
  • Interaction with C2 infrastructure is discreet and encrypted

Combined, these techniques allow FamousSparrow to stay hidden longer, collect more data, and pivot laterally inside compromised networks without being spotted.

What Can Organizations Do to Defend Themselves?

Actionable Defense Steps

If you’re managing IT infrastructure in any sector, especially if you operate Exchange Servers or IIS environments, take these actions immediately:

  1. Patch all outdated systems, including Windows Server and Exchange
  2. Restrict access to IIS servers and monitor web shell activity
  3. Implement behavioral endpoint detection, not just signature-based AV
  4. Track and log batch script execution, especially from unknown sources
  5. Use network segmentation to contain potential lateral movement
  6. Monitor connections to unknown IPs, especially if threads behave like C2 traffic

Why This Matters Now

This campaign is more than just another cyber incident, it’s a signal of evolution. The use of ShadowPad and the shift to modular, multi-threaded backdoors mark a new era of efficiency and stealth in Chinese cyber operations.,

These aren’t “spray-and-pray” attacks. They’re deliberate, high-value, and methodically crafted.

FAQs

Who is FamousSparrow?

FamousSparrow is a cyber espionage group linked to China, known for using the custom backdoor SparrowDoor and now ShadowPad.

What is SparrowDoor?

SparrowDoor is a backdoor malware that allows attackers to execute commands, manage files, take screenshots, and more , now available in modular and multi-threaded versions.

What is ShadowPad?

ShadowPad is an advanced malware platform used by multiple Chinese APTs. It allows for remote control and data theft through a modular architecture.

What made this attack successful?

Attackers targeted outdated software (Exchange and Windows Server), deployed stealthy web shells, and used enhanced backdoor variants that are difficult to detect.

How can I detect SparrowDoor?

Monitor for batch scripts from unknown sources, suspicious .NET behaviour, and thread-heavy system activity. Use network traffic analysis for C2 communications.

Is this part of a larger campaign?

Possibly. The use of ShadowPad suggests collaboration or resource sharing across Chinese APTs, which may signal coordinated efforts targeting critical organizations globally.

Share.
Leave A Reply

Exit mobile version