Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1071.001 (Web Service)
C2 via Google Sheets API polling mechanism on cell A1.
T1543.002 (Systemd Service)
Persistence established via the creation of /etc/systemd/system/xapt.service.
T1082 (System Information Discovery)
Fingerprinting host OS, username, locale, and IP address, which is then logged to spreadsheet cell V1.
T1059.004 (Unix Shell)
Execution of Base64-encoded bash commands on compromised endpoints.
CVE Profile
Undefined/Unknown [NVD Score: N/A]
[CISA KEV Status: Inactive/Unknown].
Source telemetry explicitly states the initial access vector for this specific campaign is unknown.
Telemetry
Hashes
ce36a5fc44cbd7de947130b67be9e732a7b4086fb1df98a5afd724087c973b47
(GRIDTIDE Payload)
01fc3bd5a78cd59255a867ffb3dfdd6e0b7713ee90098ea96cc01c640c6495eb
(xapt.cfg).
IPs
130.94.6[.]228 (C2 server hosting apt.tar.gz), 38.60.194[.]21 (SoftEtherVPN server).
Paths
/var/tmp/xapt /etc/systemd/system/xapt.service /usr/sbin/xapt
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Initiate incident response protocols for potential espionage; engage legal and communications teams regarding potential PII and telecom data exposure.
DETECT (DE) – Monitoring & Analysis
Command
Deploy SIEM queries for anomalous outbound HTTPS connections to sheets.googleapis.com containing /batchClear/, /batchUpdate/, or /valueRenderOption=FORMULA/ originating from non-browser processes.
Command
Alert on file creation or modification events matching the regex /^(\/usr\/sbin|\/sbin|\/var\/tmp)\/[^\\\/]+\.cfg$/.
RESPOND (RS) – Mitigation & Containment
Command
Isolate any CentOS/Linux endpoint exhibiting xapt execution spawning a shell from /var/tmp/.
Command
Revoke all compromised or suspicious Google Service Accounts immediately.
RECOVER (RC) – Restoration & Trust
Command
Rebuild compromised Linux servers from known-good gold images; do not attempt in-place eradication of root-level backdoors.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Audit and strictly limit egress traffic from critical telecom infrastructure servers; enforce explicit proxying and TLS inspection where legally permissible.
Remediation - THE HOME USER TRACK (Safety Focus)
Note
Based on the Environmental Reality Check, this specific threat targets Enterprise Linux servers, making the immediate threat to home users Theoretical/Low. Standard safety guidelines apply.
Priority 1: Safety
Command
No immediate disconnection required for home Windows/macOS devices.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords and enable multi-factor authentication (MFA) on your telecom provider accounts and Google Workspace identities using a known clean device.
Priority 3: Persistence
Command
Monitor personal cloud application settings for any unauthorized API access, third-party app linkages, or unexpected Service Accounts.
Hardening & References
Baseline
CIS Benchmarks for CentOS/Red Hat Enterprise Linux.
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Google Cloud Blog Mandiant Threat Intelligence
BleepingComputer