Silver Dragon Uses Google Drive as C2 in Government Attacks
APT41-linked threat group deploys GearDoor backdoor via Google Drive for covert command-and-control. Check Point tracks campaigns across Europe and Southeast Asia.
Check Point Research has published a technical analysis of Silver Dragon, a Chinese-nexus threat group targeting government organizations across Southeast Asia and Europe. The campaign, active since mid-2024, deploys custom backdoors including GearDoor—a .NET implant that uses Google Drive for command-and-control communications.
Silver Dragon shares significant tradecraft overlap with APT41, the dual-purpose espionage and financial crime group attributed to China's state security apparatus. The connection manifests through identical installation scripts previously documented by Mandiant in APT41 operations.
The Google Drive C2 Channel
GearDoor's C2 mechanism abuses Google Drive's legitimate file-sharing functionality. Each infected machine gets a unique folder in the threat actor's Drive account, named using the SHA-256 hash of the victim's hostname. Communication happens through file drops:
.cabfiles deliver commands to execute.pdffiles handle directory listing requests.rarfiles drop new payloads or trigger self-updates.7zfiles execute in-memory .NET plugins
Because Google Drive traffic blends with normal business activity, network monitoring tools rarely flag these connections. The service's TLS encryption prevents content inspection without SSL interception, and Drive's global CDN infrastructure makes IP-based blocking impractical.
Attack Infrastructure
Silver Dragon gains initial access through two vectors: exploiting public-facing servers and delivering phishing emails with malicious LNK attachments. The LNK files exceed 1MB—unusually large due to embedded payloads—which should trigger suspicion in organizations monitoring attachment sizes.
Persistence mechanisms include:
- AppDomain hijacking via dfsvc.exe.config manipulation
- Windows service DLL registration abuse (targeting bthsrv, wuausrv, COMSysAppSrv)
- Service stop/restart sequences forcing legitimate binaries to load malicious libraries
Primary tools deployed:
- BamboLoader: Heavily obfuscated x64 C++ shellcode loader using RC4 + LZNT1 decryption chains
- GearDoor: .NET backdoor with Google Drive C2
- MonikerLoader: .NET loader with Brainfuck string obfuscation
- Cobalt Strike: Cracked beacons with DNS tunneling and HTTP C2
C2 Infrastructure
Check Point documented numerous attacker domains designed to impersonate legitimate services:
zhydromet[.]com, ampolice[.]org, onedriveconsole[.]com, copilot-cloud[.]net, wikipedla[.]blog, splunkds[.]com
The typosquatting follows standard Chinese APT tradecraft—domains close enough to real services to pass casual inspection, hosted behind Cloudflare for DDoS protection and IP masking.
Attribution Confidence
The APT41 link rests on multiple indicators beyond installation script overlap. Compilation timestamps across BamboLoader samples cluster around UTC+8 timezone working hours. Archive creation times match across payloads, suggesting automated build pipelines. And the overall targeting pattern—government entities, telecommunications, high-value commercial targets—aligns with APT41's historical victimology.
This attribution matters because APT41 operates under China's Ministry of State Security with documented connections to Chengdu-based contractors. Organizations on Silver Dragon's target list face a well-resourced adversary with state backing, not opportunistic criminals. The conviction of Linwei Ding for stealing Google AI trade secrets on behalf of Chinese companies underscores the ongoing industrial espionage threat.
Detection Guidance
Check Point recommends monitoring for:
- Large LNK files (1MB+) in email attachments
- Google Drive authentication from unexpected processes
- Service hijacking patterns (stop → modify → restart sequences)
- .config files appearing in .NET Framework directories
- DNS tunneling traffic from workstations
- Multi-stage .NET loader execution chains
The Dust Specter campaign we covered recently showed similar cloud service abuse for C2, highlighting a broader shift toward hiding malicious traffic in legitimate platforms. Security teams should treat cloud service authentication from non-browser processes as a detection opportunity.
Why This Matters
Silver Dragon demonstrates the maturation of Chinese cyber espionage tradecraft. Google Drive C2 represents an evolution from dedicated infrastructure that defenders can blocklist. Service hijacking for persistence shows sophistication beyond simple scheduled task or registry run key methods. And the multi-tool approach—different loaders, different backdoors, different C2 channels—provides operational resilience against partial detection.
For organizations in Silver Dragon's target regions, the threat demands proactive hunting rather than passive alert monitoring. Check the published IOCs against historical logs. Audit service configurations for unauthorized modifications. And assume that Chinese-nexus APTs have already attempted access—the question is whether they succeeded.
Related Articles
Silk Typhoon Hacker Extradited to U.S. for COVID Vaccine Theft
Chinese national Xu Zewei faces nine federal counts after extradition from Italy for alleged role in Silk Typhoon attacks stealing COVID-19 vaccine research from U.S. universities and research institutions.
Apr 28, 2026GopherWhisper APT Abuses Discord and Slack to Spy on Mongolia
ESET uncovers GopherWhisper, a China-aligned APT using Go-based backdoors and legitimate cloud services like Discord, Slack, and Outlook to target Mongolian government systems.
Apr 24, 2026Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Access
Microsoft links China-based Storm-1175 to high-velocity Medusa ransomware attacks exploiting zero-day vulnerabilities. Healthcare, education, and finance sectors hit across Australia, UK, and US.
Apr 7, 2026Phantom Taurus Deploys Net-Star Backdoors Across Africa
Unit 42 exposes Phantom Taurus, a Chinese APT targeting embassies and foreign ministries with fileless NET-STAR malware. The group resurfaces within hours after discovery.
Apr 4, 2026