×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Eset
  • ESET discovers the Akairyū operation: the MirrorFace group takes European diplomats aiming for exploiting Expo 2025

Customer Press Room

ESET discovers the Akairyū operation: the MirrorFace group takes European diplomats aiming for exploiting Expo 2025

by Grandangolo Communications / Tuesday, 18 March 2025 / Published in Eset

The China-aligned APT group has conducted a cyber-espionage operation against a diplomatic institute in Central Europe, marking its first known attack on the continent. The action was carried out using advanced spearphishing techniques

Milan, 18 March 2025 – The researchers of ESET, a global European leader in the cybersecurity market, have identified a cyber-espionage operation conducted by the China-aligned APT MirrorFace group against a Central European diplomatic institute taking advantage of Expo 2025 taking place this year in Osaka, Japan.

Known mainly for its cyber espionage activities against Japanese organizations, MirrorFace appears to have turned its attention to a diplomatic institution in Europe for the first time. The campaign, discovered between the second and third quarters of 2024, was dubbed Operation AkaiRyū (Japanese for Red Dragon) and revealed a significant update to the group's tactics, techniques and procedures (TTPs).

"MirrorFace has targeted a diplomatic institution in Central Europe. To our knowledge, this is the first and so far only time that this group has targeted a diplomatic institution in Europe," says Dominik Breitenbacher, a researcher at ESET who analyzed the AkaiRyū campaign.

MirrorFace attackers orchestrated a spearphishing attack, creating an email that simulated a previous legitimate interaction between the diplomatic institute and a Japanese NGO. The decoy message exploited the Expo 2025 event in Osaka, confirming that despite the new geographical focus, MirrorFace continues to focus on Japan-related objectives.

Before targeting the European diplomatic institute, the group had already targeted two employees of a Japanese research institute, sending them a malicious password-protected Word document, although the delivery method of the file remains unknown.

While analyzing Operation AkaiRyū, ESET found that MirrorFace has significantly updated its tools and techniques. The group began using ANEL (also known as UPPERCUT), a backdoor previously considered exclusive to APT10 and believed to have been abandoned for years. However, more recent activities strongly suggest that its development has resumed. ANEL allows the execution of basic commands for manipulating files, executing payloads and taking screenshots.

"The use of ANEL provides further elements in the ongoing debate on the possible connection between MirrorFace and APT10. The fact that MirrorFace has started using ANEL, together with other information that has already emerged - such as the similarity in malware targets and code - has led us to revise our attribution: we now believe that MirrorFace is a subgroup of APT10," adds Breitenbacher.

Furthermore, MirrorFace distributed a highly customized variant of AsyncRAT, embedding this malware into a recently observed, complex execution chain, which executes it inside the Windows Sandbox. This method effectively masks malicious activity, making it difficult for security audits to detect.

In addition to the malware, MirrorFace has started leveraging Visual Studio Code (VS Code) to abuse the remote tunnels feature. This technique allows the group to establish stealthy access to the compromised system, execute arbitrary code, and distribute additional tools. Finally, MirrorFace continued to use its current flagship backdoor, HiddenFace, further strengthening persistence on compromised devices.

Between June and September 2024, ESET observed multiple spearphishing campaigns conducted by MirrorFace. According to the data collected, attackers gained initial access by tricking victims into opening malicious attachments or links, then exploiting legitimate applications and tools to stealthily install the malware. As part of Operation AkaiRyū, MirrorFace abused both applications developed by McAfee and an application built by JustSystems to run ANEL. However, ESET was unable to determine with certainty how the data was exported or whether or how it was exfiltrated.

ESET Research collaborated with the Central European diplomatic institute affected by the attack, conducting an in-depth forensic analysis. This close collaboration has allowed us to gain in-depth insight into post-compromise activities, which are usually difficult to detect. The results of the analysis were presented in January 2025 during the Joint Security Analyst Conference (JSAC).

For a more detailed technical analysis on Operation AkaiRyū, please see the ESET Research blog post “Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor” are WeLiveSecurity.com and follow ESET Research su Twitter (X time) for updates on the latest ESET research news.

About Grandangolo Communications

What you can read next

ESET predicts that Ransomware and fileless malware will be the biggest threats in 2021
ESET researchers have identified apps for trading cryptocurrencies affected by trojans and used to steal user data
ESET MSP specialized research partners and investing in advanced cybersecurity solutions

Customer Press Room

  • Vertiv introduces backup power for personal devices and business applications

    Vertiv™ PowerUPS 200 Series is a ...
  • Sandworm Group Hits Energy Company in Poland with DynoWiper: ESET Research Analysis

    ESET researchers have identified DynoWip...
  • Antonio Menghini is the new Chief Commercial Officer of Innovaway

    At the same time, Giuseppe Piccolo took over ...
  • Vertiv introduces a new AI-powered predictive maintenance service for modern data centers and AI factories

    Vertiv™ Next Predict is a new service...
  • Vertiv expands flexible, energy-efficient edge cooling system for small, medium and edge applications in EMEA

    The Vertiv perimeter cooling system...

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • Abstract
  • abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Innovaway
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP