APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Summary

Cybersecurity researchers have detailed the operations of an APT group known as Silver Dragon, which has been targeting European and Southeast Asian governments since mid-2024. The group employs Cobalt Strike and Google Drive for command and control (C2) and gains initial access through exploited public-facing servers and malicious phishing attachments.

IFF Assessment

FOE

This indicates an active, sophisticated threat actor (APT group) with established tactics, techniques, and procedures (TTPs) that pose a direct risk to targeted organizations.

Defender Context

Defenders should be aware of the tactics used by Silver Dragon, particularly the exploitation of public-facing servers and the use of phishing emails with malicious attachments. Monitoring for Cobalt Strike and unusual Google Drive activity could be indicators of compromise. This highlights the persistent threat posed by APT groups and the need for robust defenses against common initial access vectors.

Read Full Story →