Overview
Oasis Security identified a targeted intrusion campaign against multiple Malaysian government organizations, characterized by purpose-built Python tooling per target for internal enumeration and data exfiltration, active webshell deployment, and previously undisclosed C2 infrastructure including...
oasis-security.io
Oasis Security identified attacker-controlled infrastructure hosted on Microsoft Azure infrastructure in the Malaysia West region, used to conduct a targeted intrusion campaign against
multiple Malaysian organizations.
The operation demonstrates a high degree of operational planning, with the attacker developing
purpose-built Python tooling for each target — covering internal network enumeration, database access, and external data exfiltration.
Key characteristics of this campaign include:
- Custom Python exfiltration framework: Target-specific scripts developed for database access, enumeration, and data staging across multiple government domains
- Chained Laravel RCE exploitation: Five chained vulnerabilities leveraged to achieve remote code execution against a Malaysian mobile network operator's customer identity verification platform
- Previously undisclosed C2 tooling: Source code for an unpublished C# beacon and a Python-based C2 controller collected from attacker infrastructure