Blog
/
Email
/
August 2, 2024

Safelink Smuggling: Enhancing Resilience Against Malicious Links

Gain insights into safelink smuggling tactics and learn strategies to protect your organization from the dangers posed by malicious links.
Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Carlos Gray
Senior Product Marketing Manager, Email
Written by
Stephen Pickman
Senior Vice President, Engineering
Default blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog image
02
Aug 2024

Darktrace security members and researchers have recently seen a rise in what we are calling Safelink Smuggling. Safelinks are URLs rewritten by security solutions to enable additional analysis when the URL is clicked. Once analyzed, they may prompt a user, redirect the browser back to the original URL, or block further access if deemed necessary.

What is Safelink Smuggling?

Safelink Smuggling is a technique that involves an attacker purposely getting their malicious payload rewritten by a security solution’s Safelink capability to then propagate the rewritten URL to others. This technique is a way for attackers to not only avoid detection by traditional email security and other solutions, but also to instill mistrust in all email security solutions. As a result, Safelinks from a range of popular email security providers are often seen in phishing or supply chain attacks. In fact, Darktrace has observed over 300,000 cases of Safelinks being included in unexpected and suspicious contexts over the last 3 months.

How does Safelink Smuggling work?

Safelink Smuggling has two key stages: Getting a malicious link rewritten by an email security solution, then propagating that rewritten link to other victims.

Step one:

Obfuscated a malicious payload through a Safelink capability rewriting the link; Darktrace has seen this attempted through two methods – Compromised Account or Reply-Chain.

  • Method 1: Compromised Account

If an attacker can gain access to a compromised account – whether that’s through brute force, malware or credential theft – they can infiltrate it with malicious links, and then exfiltrate the Safelinks created as the email passes through security filtering. In other words, attackers will send a malicious payload to the compromised inbox, with the intent that the malicious URL gets rewritten. Unlike a normal phishing email where the threat actor wants to avoid having their email blocked, in this case the objective is for the email to get through to the inbox with the link rewritten. As observed by Darktrace, attackers often send the link in isolation as any additional components (i.e., body text or other content in the email) could cause a more severe action such as the email security solution holding the message.

  • Method 2: Reply-Chain

With this method, the attacker sends a malicious link to an email security vendor’s customer in an attempt to solicit a reply from an internal user. This allows them to grab the re-written URL within the reply chain. However, this is a risky tactic which can fail at several points. The attacker has to be confident the initial email won't be blocked outright; they also risk alerting security vendors to the address and the URL intended to be used for the main campaign. They also must be confident that the checks made when the re-written URL is clicked will not lead to a block at the final destination.
Regardless of the method used, the end result will appear as follows:

For example, the original malicious URL may look like this,

faceldu[.]org/Invoice112.zip

(negative surface indicators: recently registered domain, file extension)

And after being rewritten,

securityvevndor[.]com/safe?q=aNDF80dfaAkAH930adbd

(positive surface indicators: established domain, positive reputation, associated with safe content)

Step Two:

Now that the attacker has access to a malicious URL that has been obfuscated by a safe rewrite, attackers can forward or craft an email leveraging that same link. In fact, we have even seen multiple layers of Safelink Smuggling being used to mask a payload further.

The Challenge of Link Rewriting

Traditional email security solutions rewrite all links sent to an organization, but there is an inherent risk to this methodology. Rewriting every link, whether harmless or harmful, leads employees to lose context and creates a false sense of security when interacting with rewritten links in emails. Furthermore, it provides attackers with many opportunities to exploit Safelinks. As demonstrated in Method 2 above, if an email security solution does not rewrite every link, executing such attacks would be significantly more challenging.

Traditionally, rewriting every link made sense from a security perspective, as it allowed servers to thoroughly analyze links for known attack patterns and signatures. However, this approach relies on identifying previously recognized threats. Conversely, Darktrace / EMAIL gathers sufficient information about a link without needing to rewrite it, by analyzing the context and content of the email and the link itself.

In fact, Darktrace is the pioneer in applying selective rewriting to URLs based on suspicious properties or context, a method that other solutions have since adopted. While traditional solutions rewrite links to assess them only after they are clicked, Darktrace / EMAIL takes immediate action to neutralize threats before they reach the inbox.

Darktrace achieves high success rates in detecting malicious links and emails on the first encounter using Self-Learning AI. By understanding 'normal' behavior in email communications, Darktrace identifies subtle deviations indicative of cyber threats and selectively rewrites only those links deemed suspicious, ensuring a targeted, proportionate, and non-disruptive response.

Why do traditional email security solutions miss Safelink attacks?

Traditional security solutions that focus on learning attack patterns will miss Safelink threats as they are often utilized in attacks that have a variety of layers which help the email seem legitimate. Leveraging all the classic techniques seen in a supply chain attack to disguise the sender's intent, taking advantage of the users' inherent trust in familiar sources, the user is more likely to lower their defenses.

For more information: https://darktrace.com/products/email/use-cases/supply-chain-attack

In terms of the URL, if the payload is malicious, why is it difficult for email security solutions to catch it? Primarily, other security vendors will focus on the payload in isolation, attempting to find known attack patterns or signatures such as a domain name or IP with a bad reputation. Unfortunately, with this technique, if the URL has a legitimate domain, it will return a clean track record. Common obfuscation techniques such as captchas, short-links, and click throughs can all be deployed to add layers of complexity to the analysis.

Safelink Smuggling relies heavily on link redirects, which means that web analysis tools will falter as they will only analyze the first redirect. Consequently, when more in-depth analysis on the link itself is performed, the first place the URL takes the user is not the malicious site but rather the default on-click analysis of the vendor in question. Therefore, any traditional browser or link analysis will also return a negative result.

Finally, the context itself is important. In contrast to traditional email security solutions, Darktrace / EMAIL asks who, what, when, where, and why for every single email, and compares it to the pattern of life of both the internal recipient and the external sender, rather than attempting to match patterns with historical threat data. When analyzing an email from an inbound perspective, Darktrace reveals potential deviations from normal, that, when considered sufficiently anomalous, will result in taking a proportional action to the threat assessed.

To illustrate the above, let’s take a look at an example email that Darktrace recently caught.

The following is an email a Darktrace customer received, which Darktrace / EMAIL held before it reached the inbox. In this case, the smuggled Safelink was further obfuscated behind a QR Code. The accompanying document also presented some anomalies in terms of its intent, perceived as a potential social engineering attempt. Finally, the lack of association and low mailing history meant there was no prior context for this email.  

Example of a Safelink Smuggling attack using a popular email security solution’s safelink.
Fig 1: Example of a Safelink Smuggling attack using a popular email security solution’s safelink.

How to mitigate against Safelink Smuggling?

It's difficult for email security vendors to do anything about their links being reused, and reuse should almost be expected by popular operators in the email security space. Therefore, the presence of links from a vendor’s domain in a suspicious email communication rarely indicates a compromise of the link rewrite infrastructure or a compromise of the third-party vendor.

Email security vendors can improve their defense-in-depth, especially around their email provider accounts to avoid Method 1 (Compromised Account attacks) and become more selective with their rewrites to curtail Method 2 (Reply Chain attacks).

Primary protection against Safelink Smuggling should be offered by the email security vendor responsible for inbound email analysis. They need to ensure that techniques such as Safelink Smuggling are not evaded by their detection mechanisms.

Darktrace has long been working on the betterment of security within the email community and innovating our link analysis infrastructure to mitigate against this attack methodology (read more about our major update in 6.2 here), regardless of whether the receiving organization are Darktrace customers.

How does Darktrace deal with Safelink Smuggling today?

Darktrace has been dealing with Safelink Smuggling since launch and has a standardized recommendation for customers who are looking to defend against this threat.

Customers want to avoid being 1) the propagators of this threat and potentially damaging their brand reputation, and 2) being victims of the supply chain attack thereafter.

The principal recommendation to protect customer accounts and consequently their brands is to ensure defense-in-depth. As accounts establish themselves as the crown jewels of any modern enterprise, organizations should vigilantly monitor their account activity with the same rigor they would analyze their network activity. Whether that is through the base account takeover protection offered by Darktrace / EMAIL, or the expanded defense offered by Darktrace / IDENTITY, it is crucial that the accounts themselves have a robust security solution in place.

Secondly, to avoid falling victim to the supply chain attack that leverages a third-party vendor’s link rewrite, it is imperative to use a solution that does not rely on static threat intelligence and link reputation analysis. Rather than chasing attackers by updating rules and signatures, Darktrace leverages Self-Learning AI to learn the communication patterns of both internal and external messages to reveal deviations in both content and context.

Finally, for those customers that already leverage Darktrace / EMAIL we recommend ensuring that lock links are enabled, and that the default warning page is displayed every time a link is rewritten, no matter the perceived severity of the link. This will allow any potential user that clicks on a rewritten Darktrace / EMAIL link to be alerted to the potential nature of the site they are trying to access.

Safelink smuggling example caught by Darktrace

While most cases involve other vendors, analysts recently saw a case where Darktrace's own links were used in this type of attack. A small number of links were leveraged in a campaign targeting both Darktrace and non-Darktrace customers alike. Thankfully, these attempts were all appropriately actioned by those customers that had Darktrace / EMAIL deployed.

In the example below, you will see how Darktrace Cyber AI Analyst describes the example at hand under the Anomaly Indicators section.

Example of Safelink Smuggling attack on Darktrace using the Darktrace Safelink Infrastructure.
Fig 2: Example of Safelink Smuggling attack on Darktrace using the Darktrace Safelink Infrastructure.

First, the display name mismatch can be interpreted as an indicator of social engineering, attempting to deceive the recipient with an IT policy change.

Second, the link itself, which in this case is a hidden redirect to an unusual host for this environment.

Finally, there is a suspected account takeover due to the origin of the email being a long-standing, validated domain that contains a wide variety of suspicious elements.

Darktrace / EMAIL would have held this email from being delivered.

Conclusion

By investigating Safelink Smuggling, Darktrace wants to shine a light on the technique for security teams and help raise awareness of how it can be used to dupe users into lowering their defenses. Challenge your email security vendor on how it deals with link analysis, particularly from trusted senders and applications.

Interested in Darktrace’s approach to defense-in-depth? Check out Darktrace / EMAIL

Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Carlos Gray
Senior Product Marketing Manager, Email
Written by
Stephen Pickman
Senior Vice President, Engineering

More in this series

No items found.

Blog

/

AI

/

May 18, 2026

AI Insider Threats: How Generative AI is Changing Insider Risk

ai insider threatsDefault blog imageDefault blog image

How generative AI changes insider behavior

AI systems, especially generative platforms such as chatbots, are designed for engagement with humans. They are equipped with extraordinary human-like responses that can both confirm, and inflate, human ideas and ideology; offering an appealing cognitive partnership between machine and human.  When considering this against the threat posed by insiders, the type of diverse engagement offered by AI can greatly increase the speed of an insider event, and can facilitate new attack platforms to carry out insider acts.  

This article offers analysis on how to consider this new paradigm of insider risk, and outlines key governance principles for CISOs, CSOs and SOC managers to manage the threats inherent with AI-powered insider risk.

What is an insider threat?

There are many industry or government definitions of what constitutes insider threat. At its heart, it relates to the harm created when trusted access to sensitive information, assets or personnel is abused bywith malicious intent, or through negligent activities.  

Traditional methodologies to manage insider threat have relied on two main concepts: assurance of individuals with access to sensitive assets, and a layered defense system to monitor for any breach of vulnerability. This is often done both before, and after access has been granted.  In the pre-access state, assurance is gained through security or recruitment checks. Once access is granted, controls such as privileged access, and zero-trust architecture offer defensive layers.

How does AI change the insider threat paradigm?

While these two concepts remain central to the management of insider threats, the introduction of AI offers three key new aspects that will re-shape the paradigm:.  

AI can act as a cognitive amplifier, influencing and affecting the motivations that can lead to insider-related activity. This is especially relevant for the deliberate insider - someone who is considering an act of insider harm. These individuals can now turn to AI systems to validate their thinking, provide unique insights, and, crucially, offer encouragement to act. With generative systems hard-wired to engage and agree with users, this can turn a helpful AI system into a dangerous AI hype machine for those with harmful insider intent.  

AI can act as an operational enabler. AI can now develop and increase the range of tools needed to carry out insider acts. New social engineering platforms such as vishing and deepfakes give adversaries a new edge to create insider harm. AI can generate solutions and operational platforms at increasing speeds; often without the need for human subject matter expertise to execute the activities. As one bar for advanced AI capabilities continues to be raised, the bar needed to make use of those platforms has become significantly lower.

AI can act as a semi-autonomous insider, particularly when agentic AI systems or non-human identities are provided broad levels of autonomy; creating a vector of insider acts with little-to-no human oversight or control. As AI agents assume many of the orchestration layers once reserved for humans, they do so without some of the restricted permissions that generally bind service accounts. With broad levels of accessibility and authority, these non-human identities (NHIs) can themselves become targets of insider intent.  Commonly, this refers to the increasing risks of prompt injection, poisoning, or other types of embedded bias. In many ways, this mirrors the risks of social engineering traditionally faced by humans. Even without deliberate or malicious efforts to corrupt them, AI systems and AI agents can carry out unintended actions; creating vulnerabilities and opportunities for insider harm.

How to defend against AI-powered insider threats

The increasing attack surfaces created or facilitated by AI is a growing concern.  In Darktrace’s own AI cybersecurity research, the risks introduced, and acknowledged, through the proliferation of AI tools and systems continues to outstrip traditional policies and governance guardrails. 22% of respondents in the survey cited ‘insider misuse aided by generative AI’ as a major threat concern.  And yet, in the same survey, only 37% of all respondents have formal policies in place to manage the safe and responsible use of AI.  This draws a significant and worrying delta between the known risks and threat concerns, and the ability (and resources) to mitigate them.

What can CISOs and SOC leaders do to protect their organization from AI insider threats?  

Given the rapid adaptation, adoption, and scale of AI systems, implementing the right levels of AI governance is non-negotiable. Getting the correct balance between AI-driven productivity gains and careful compliance will lead to long-term benefits. Adapting traditional insider threat structures to account for newer risks posed through the use of AI will be crucial. And understanding the value of AI systems that add to your cybersecurity resilience rather than imperil it will be essential.

For those responsible for the security and protection of their business assets and data holdings, the way AI has changed the paradigm of insider threats can seem daunting.  Adopting strong, and suitable AI governance can become difficult to introduce due to the volume and complexity of systems needed to be monitored. As well as traditional insider threat mitigations such as user monitoring, access controls and active management, the speed and autonomy of some AI systems need different, as well as additional layers of control.  

How Darktrace helps protect against AI-powered insider threats

Darktrace has demonstrated that, through platforms such as our proprietary Cyber AI Analyst, and our latest product Darktrace / SECURE AI, there are ways AI systems can be self-learning, self-critical and resilient to unpredictable AI behavior whilst still offering impressive returns; complementing traditional SOC and CISO strategies to combat insider threat.  

With / SECURE AI, some of the ephemeral risks drawn through AI use can be more easily governed.  Specifically, the ability to monitor conversational prompts (which can both affect AI outputs as well as highlight potential attempts at manipulation of AI; raising early flags of insider intent); the real-time observation of AI usage and development (highlighting potential blind-spots between AI development and deployment); shadow AI detection (surfacing unapproved tools and agents across your IT stack) and; the ability to know which identities (human or non-human) have permission access. All these features build on the existing foundations of strong insider threat management structures.  

How to take a defense-in-depth approach to AI-powered insider threats

Even without these tools, there are four key areas where robust, more effective controls can mitigate AI-powered insider threat.  Each of the below offers a defencce-in-depth approach: layering acknowledgement and understanding of an insider vector with controls that can bolster your defenses.  

Identity and access controls

Having a clear understanding of the entities that can access your sensitive information, assets and personnel is the first step in understanding the landscape in which insider harm can occur.  AI has shown that it is not just flesh and bone operators who can administer insider threats; Non-Human Identities (such as agentic AI systems) can operate with autonomy and freedom if they have the right credentials. By treating NHIs in the same way as human operators (rather than helpful machine-based tools), and adding similar mitigation and management controls, you can protect both your business, and your business-based identities from insider-related attention.

Visibility and shadow AI detection

Configuring AI systems carefully, as well as maintaining internal monitoring, can help identify ‘shadow AI’ usage; defined as the use of unsanctioned AI tools within the workplace1 (this topic was researched in Darktrace’s own paper on "How to secure AI in the enterprise". The adoption of shadow AI could be the result of deliberate preference, or ‘shortcutting’; where individuals use systems and models they are familiar with, even if unsanctioned. As well as some performance risks inherent with the use of shadow AI (such as data leakage and unwanted actions), it could also be a dangerous precursor for insider-related harm (either through deliberate attempts to subvert regular monitoring, or by opening vulnerabilities through unpatched or unaccredited tooling).

Prompt and Output Guardrails

The ability to introduce guardrails for AI systems offers something of a traditional “perimeter protection” layer in AI defense architecture; checking prompts and outputs against known threat vectors, or insider threat methodologies. Alone, such traditional guardrails offer limited assurance.  But, if tied with behavior-centric threat detection, and an enforcement system that deters both malicious and accidental insider activities, this would offer considerable defense- in- depth containment.  

Forensic logging and incident readiness response

The need for detection, data capture, forensics, and investigation are inherent elements of any good insider threat strategy. To fully understand the extent or scope of any suspected insider activity (such as understanding if it was deliberate, targeted, or likely to occur again), this rich vein of analysis could prove invaluable.  As the nature of business increasingly turns ephemeral; with assets secured in remote containers, information parsed through temporary or cloud-based architecture, and access nodes distributed beyond the immediate visibility of internal security teams, the development of AI governance through containment, detection, and enforcement will grow ever more important.

Enabling these controls can offer visibility and supervision over some of the often-expressed risks about AI management. With the right kind of data analytics, and with appropriate human oversight for high-risk actions, it can illuminate the core concerns expressed through a new paradigm of AI-powered insider threats by:

  • Ensuring deliberately mis-configured AI systems are exposed through regular monitoring.
  • Highlighting changes in systems-based activity that might indicate harmful insider actions; whether malicious or accidental.
  • Promoting a secure-by-design process that discourages and deters insider-related ambitions.
  • Ensuring the control plane for identity-based access spans humans, NHIs and AI models, and:
  • Offering positive containment strategies that will help curate the extent of AI control, and minimize unwanted activities.

Why insider threat remains a human challenge

At its root, and however it has been configured, AI is still an algorithmic tool; something designed to automate, process and manage computational functions at machine speed, and boost productivity.  Even with the best cybersecurity defenses in place, the success of an insider threat management program will still depend on the ability of human operators to identify, triage, and manage the insider threat attack surface.  

AI governance policies, human-in-the-loop break points, and automated monitoring functions will not guard against acts of insider harm unless there is intention to manage this proactively, and through a strong culture of how to guard against abuses of trust and responsibility.

[related-resource]

Continue reading
About the author
Jason Lusted
AI Governance Advisor

Blog

/

Network

/

May 14, 2026

Chinese APT Campaign Targets Entities with Updated FDMTP Backdoor

Default blog imageDefault blog image

Darktrace have identified activity consistent with Chinese-nexus operations, a Twill Typhoon-linked campaign targeting customer environments, primarily within the Asia-Pacific & Japan (APJ) region

Beginning in late September 2025, multiple affected hosts were observed making requests to domains impersonating content delivery networks (CDNs), including infrastructure masquerading as Yahoo- and Apple-affiliated services. Across these cases, Darktrace identified a consistent behavioral execution pattern: the retrieval of legitimate binaries alongside malicious Dynamic Link Libraries (DLLs), enabling sideloading and execution of a modular .NET-based Remote Access Trojan (RAT) framework.

The activity aligns with patterns described in Darktrace’s previous Chinese-nexus operations report, Crimson Echo. In this case, observed modular intrusion chains built on legitimate software, and staged payload delivery. Threat actors retrieve legitimate binaries alongside configuration files and malicious DLLs to enable sideloading of a .NET-based RAT.

Observed Campaign

Across cases, the same ordered sequence appears: retrieval of a legitimate executable, (2) retrieval of a matching .config file, (3) retrieval of the malicious

DLL, (4) repeated DLL downloads over time, and (5) command-and-control (C2) communication. The .config file retrieves a malicious binary, while the legitimate binary provides a legitimate process to run it in.

Darktrace assesses with moderate confidence that this activity aligns with publicly reported Twill Typhoon tradecraft. The observed use of FDMTP, DLL sideloading, and overlapping infrastructure is consistent with previously observed operations, though not unique to a single actor. While initial access was not directly observed, previous Twill Typhoon campaigns have typically involved spear-phishing.

What Darktrace Observed

Since late September 2025, Darktrace has observed multiple customer environments making HTTP GET requests to infrastructure presenting as “CDN” endpoints for well-known platforms (including Yahoo and Apple lookalikes). Across cases, the affected hosts retrieved legitimate executables, then matching .config files (same base filename), then DLLs intended for sideloading. The sequencing of a legitimate binary + configuration + DLL  has been previously observed in campaigns linked to China-nexus threat actors.

In several cases, affected hosts also issued outbound requests to a /GetCluster endpoint, including the protocol=Dotnet-Tcpdmtp parameter. This activity was repeatedly followed by retrieval of DLL content that was subsequently used for search-order hijacking within legitimate processes.

In the September–October 2025 cases, Darktrace alerting commonly surfaced early-stage registration and C2 setup behaviors, followed by retrieval of a DLL (e.g., Client.dll) from the same external host, sometimes repeatedly over multiple days, consistent with establishing and maintaining the execution chain.

In April 2026, a finance-sector endpoint initiated a series of GET requests to yahoo-cdn[.]it[.]com, first fetching legitimate binaries (including vshost.exe and dfsvc.exe), then repeatedly retrieving associated configuration and DLL components (including dfsvc.exe.config and dnscfg.dll) over an 11-day window. The use of both Visual Studio hosting and OneClick (dfsvc.exe) paths are used to ensure the malware can run in the targeted environment.

Technical Analysis

Initial staging and execution

While the initial access method is unknown, Darktrace security researchers identified multiple archives containing the malware.

A representative example includes a ZIP archive (“test.zip”) containing:

  • A legitimate executable: biz_render.exe (Sogou Pinyin IME)
  • A malicious DLL: browser_host.dll

Contained within the zip archive named “test.zip” is the legitimate binary “biz_render.exe”, a popular Chinese Input Method Editor (IME) Sogou Pinyin.

Alongside the legitimate binary is a malicious DLL named “browser_host.dll”. As the legitimate binary loads a legitimate DLL named “browser_host.dll” via LoadLibraryExW, the malicious DLL has been named the same to sideload the malicious DLL into biz_render.exe. By supplying a malicious DLL with an identical name, the actor hijacks execution flow, enabling the payload to execute within a trusted process.

Figure 1: Biz_render.exe loading browser_host.dll.

The legitimate binary invokes the function GetBrowserManagerInstance from the sideloaded “browser_host.dll”, which then performs XOR-based decryption of embedded strings (key 0x90) to resolve and dynamically load mscoree.dll.

The DLL uses the Windows Common Language Runtime (CLR) to execute managed .NET code inside the process rather than relying solely on native binaries. During execution, the loader loads a payload directly into memory as .NET assemblies, enabling an in-memory execution.

C2 Registration

A GET request is made to:

GET /GetCluster?protocol=DotNet-TcpDmtp&tag={0}&uid={1}

with the custom header:

Verify_Token: Dmtp

This returns Base64-encoded and gzip-compressed IP addresses used for subsequent communication.

Figure 2: Decoded IPs.

Staged payload retrieval

Subsequent activity includes retrieval of multiple components from yahoo-cdn.it[.]com. The following GET requests are made:

/dfsvc.exe

/dnscfg.dll

/dfsvc.exe.config

/vhost.exe

/Microsoft.VisualStudio.HostingProcess.Utilities.Sync.dll

/config.etl

ClickOnce and AppDomain hijacking

Dfsvc.exe is the legitimate Windows ClickOnce Engine, part of the .NET framework used for updating ClickOnce Applications. Accompanying dfsvc.exe is a legitimate dfsvc.exe.config file that is used to store configuration data for the application. However, in this instance the malware has replaced the legitimate dfsvc.exe.config with the one retrieved from the server in: C:\Windows\Microsoft.NET\Framework64\v4.0.30319.

Additionally, vhost.exe the legitimate Visual Studio hosting process is retrieved from the server, along with “Microsoft.VisualStudio.HostingProcess.Utilities.Sync.dll” and “config.etl”. The DLL is used to decrypt the AES encrypted payload in config.etl and load it. The encrypted payload is dnscfg.dll, which can be loaded into vshost instead of dfsvc, and may be used if the environment does not support .NET.

Figure 3: ClickOnce configuration.

The malicious configuration disables logging, forces the application to load dnscfg.dll from the remote server, and uses a custom AppDomainManager to ensure the DLL is executed during initialization of dfsvc.exe. To ensure persistence, a scheduled task is added for %APPDATA%\Local\Microsoft\WindowsApps\dfsvc.exe.

Core payload

The DLL dnscfg.dll is a .NET binary named Client.TcpDmtp.dll. The payload is a heavily obfuscated backdoor that generates its logic at runtime and communicates with the command and control (C2) over custom TCP, DMTP (Duplex Message Transport Protocol) and appears to be an updated version of FDMTP to version 3.2.5.1

Figure 4: InitializeNewDomain.

The payload:

  • Uses cluster-based resolution (GetHostFromCluster)
  • Implements token validation
  • Enters a persistent execution loop (LoopMessage)
  • Supports structured remote tasking over DMTP

Once connected, the malware enters a persistent loop (LoopMessage), enabling it to receive commands from the remote server.

Figure 5: DMTP Connect function.

Rather than referencing values directly, they are retrieved through containers that are resolved at runtime. String values are stored in an encrypted byte array (_0) and decrypted by a custom XOR-based string decryption routine (dcsoft). The lower 16 bits of the provided key are XORed with 0xA61D (42525) to derive the initial XOR key, while subsequent bits define the string length and offset into the encrypted byte array. Each character is reconstructed from two encrypted bytes and XORed with the incrementing key value, producing the plaintext string used by the payload.

Figure 6: Decrypted strings.

Embedded in the resources section are multiple compressed binaries, the majority of which are library files. The only exceptions are client.core.dll and client.dmtpframe.dll.

Figure 7: Resources.

Modular framework and plugins

The payload embeds multiple compressed libraries, notably:

  • client.core.dll
  • client.dmtpframe.dll

Client.core.dll is a core library used for system profiling, C2 communication and plugin execution. The implant has the functionality to retrieve information including antivirus products, domain name, HWID, CLR version, administrator status, hardware details, network details, operating system, and user.

Figure 8: Client.Core.Info functions.

Additionally, the component is responsible for loading plugins, with support for both binary and JSON-based plugin execution. This allows plugins to receive commands and parameters in different formats depending on the task being performed.

The framework handles details such as plugin hashes, method names, task identifiers, caller tracking, and argument processing, allowing plugins to be executed consistently within the environment. In addition to execution management, the library also provides plugins with access to common runtime functionality such as logging, communication, and process handling.

Figure 9: Client.core functions.

client.dmtpframe.dll handles:

  • DMTP communication
  • Heartbeats and reconnection
  • Plugin persistence via registry:

HKCU\Software\Microsoft\IME\{id}

Client.dmtpframe.dll is built on the TouchSocket DMTP networking library and continues to manage the remote plugins. The DLL implements remote communication features including heartbeat maintenance, reconnection handling, RPC-style messaging, SSL support, and token-based verification. The DLL also has the ability to add plugins to the registry under HKCU/Software/Microsoft/IME/{id} for persistence.

Plugins observed

While the full set of plugins remains unknown, researchers were able to identify four plugins, including:

  • Persist.WpTask.dll - used to create, remove and trigger scheduled Windows tasks remotely.
  • Persist.registry.dll - used to manage registry persistence with the ability to create, and delete registry values, along with hidden persistence keys.
  • Persist.extra.dll - used to load and persist the main framework.
  • Assist.dll - used to remotely retrieve files or commands, as well as manipulate system processes.
Figure 10: Plugins stored in IME registry.
Figure 11: Obfuscated script in plugin resources.

Persist.extra.dll is a module that is used to load a script “setup.log” to load and persist the main framework. Stored within the resources section of the binary is an obfuscated script that creates a .NET COM object that is added to the registry key HKCU\Software\Classes\TypeLib\ {9E175B61-F52A-11D8-B9A5-505054503030} \1.0\1\Win64 for persistence. After deobfuscating this script, another DLL is revealed named “WindowsBase.dll”.

Figure 12: Registry entry for script.

The binary checks in with icloud-cdn[.]net every five minutes, retrieves a version string, downloads an encrypted payload named checksum.bin, saves it locally as C:\ProgramData\USOShared\Logs\checksum.etl, decrypts it with AES using the hardcoded key POt_L[Bsh0=+@0a., and loads the decrypted assembly directly from memory via Assembly.Load(byte[]). The version.txt file acts as an update marker so it only re-downloads when the remote version changes, while the mutex prevents duplicate instances.

Figure 13: USOShared/Logs.

Checksum.etl is decrypted with AES and loaded into memory, loading another .NET DLL named “Client.dll”. This binary is the same as “dnscfg.dll” mentioned at the start and allows the threat actors to update the main framework based on the version.

Conclusion

Across cases, Darktrace consistently observed the following sequence:

  • Retrieval of legitimate executables
  • Retrieval of DLLs for sideloading
  • C2 registration via /GetCluster

This approach is consistent with broader China-nexus tradecraft. As outlined in Darktrace’s Crimson Echo report, the stable feature of this activity is behavioral. Infrastructure rotates and payloads can change, but the execution model persists. For defenders, the implication is straightforward: detection anchored to individual indicators will degrade quickly. Detection anchored to a behavioral sequence offer a far more durable approach.

Credit to Tara Gould (Malware Research Lead), Adam Potter (Senior Cyber Analyst), Emma Foulger (Global Threat Research Operations Lead), Nathaniel Jones (VP, Security & AI Strategy)

Edited by Ryan Traill (Content Manager)


Appendices

A detailed list of detection models and triggered indicators is provided alongside IoCs.

Indicators of Compromise (IoCs)

Test.zip - fc3959ebd35286a82c662dc81ca658cb

Dnscfg.dll - b2c8f1402d336963478f4c5bc36c961a

Client.TcpDmtp.dll - c52b4a16d93a44376f0407f1c06e0b

Browser_host.dll - c17f39d25def01d5c87615388925f45a

Client.DmtpFrame.dll - 482cc72e01dfa54f30efe4fefde5422d

Persist.Extra - 162F69FE29EB7DE12B684E979A446131

Persist.Registry - 067FBAD4D6905D6E13FDC19964C1EA52

Assist - 2CD781AB63A00CE5302ED844CFBECC27

Persist.WpTask - DF3437C88866C060B00468055E6FA146

Microsoft.VisualStudio.HostingProcess.Utilities.Sync.dll - c650a624455c5222906b60aac7e57d48

www.icloud-cdn[.]net

www.yahoo-cdn.it[.]com

154.223.58[.]142[AP8] [EF9]

MITRE ATT&CK Techniques

T1106 – Native API

T1053.005 - Scheduled Task

T1546.16 - Component Object Model Hijacking

T1547.001 - Registry Run Keys

T1511.001 - Dynamic Link Library Injection

T1622 – Debugger Evasion

T1140 – Deobfuscate/Decode Files or Information

T1574.001 - Hijack Execution Flow: DLL

T1620 – Reflective Code Loading

T1082 – System Information Discovery

T1007 – System Service Discovery

T1030 – System Owner/User Discovery

T1071.001 - Web Protocols

T1027.007 - Dynamic API Resolution

T1095 – Non-Application Layer Protocol

Darktrace Model Alerts

·      Compromise / Beaconing Activity To External Rare

·      Compromise / HTTP Beaconing to Rare Destination

·      Anomalous File / Script from Rare External Location

·      Compromise / Sustained SSL or HTTP Increase

·      Compromise / Agent Beacon to New Endpoint

·      Anomalous File / EXE from Rare External Location

·      Anomalous File / Multiple EXE from Rare External Locations

·      Compromise / Quick and Regular Windows HTTP Beaconing

·      Compromise / High Volume of Connections with Beacon Score

·      Anomalous File / Anomalous Octet Stream (No User Agent)

·      Compromise / Repeating Connections Over 4 Days

·      Device / Large Number of Model Alerts

·      Anomalous Connection / Multiple Connections to New External TCP Port

·      Compromise / Large Number of Suspicious Failed Connections

·      Anomalous Connection / Multiple Failed Connections to Rare Endpoint

·      Device / Increased External Connectivity

Continue reading
About the author
Tara Gould
Malware Research Lead
Your data. Our AI.
Elevate your network security with Darktrace AI