China-Linked Malware Targets Apple and Yahoo Users with Typhoon Malware
Security Researchers Uncover Sophisticated Twill Typhoon Espionage Campaign
In a recent study, cybersecurity firm Darktrace has identified a complex espionage operation attributed to the group known as Twill Typhoon, targeting organizations in Japan and the Asia-Pacific region.
Campaign Overview
- The campaign began in late September 2025 and involves the creation of fake websites mimicking well-known services such as Apple and Yahoo.
- The deployment of the FDMTP malware framework to gain unauthorized access to victim systems.
Fake Websites and Content Delivery Networks (CDNs)
The attack typically begins with the establishment of a connection to a fake content delivery network (CDN), often using addresses like “yahoo-cdn.it.com.” This allows the attackers to create a convincing illusion of legitimacy.
DLL Sideloading and Malicious Files
Once the victim system connects to the fake CDN, the attackers deploy a technique called DLL sideloading, which involves loading a legitimate application and tricking it into executing a malicious DLL file simultaneously.
Persistence and Remote Control
To maintain persistence, the attackers utilize the FDMTP framework, which enables them to send new commands and updates to the infected system.
Recommendations and Expert Insights
Researchers emphasize that the success of this campaign relies on the attackers’ ability to blend in with legitimate system activities, making traditional indicators of compromise less effective.
