Recent cybersecurity findings by IBM X-Force reveal a surge in targeted cyberattacks by a China-aligned threat actor known as Hive0154.
The group is exploiting the Tibetan community’s geopolitical concerns, using tailored lure documents and filenames to spread highly sophisticated malware, most notably the Pubload backdoor.
These campaigns coincide with significant events for the Tibetan diaspora, including the Dalai Lama’s 90th birthday and the 9th World Parliamentarians’ Convention on Tibet (WPCT).
Hive0154’s 2025 campaigns have showcased a marked escalation in both sophistication and cunning.
The group crafts phishing emails and weaponized archives featuring topics specifically designed to entice Tibetan community members and their supporters. Lure themes include:
These lures often contain authentic-looking documents and images from Tibetan websites and conferences, packaged alongside malicious executables with similar names a tactic designed to trick recipients into running malware laden files.
The infection process begins with a spear-phishing email containing a link to a Google Drive-hosted weaponized archive.
Once downloaded and opened, the archive contains a benign executable that is vulnerable to DLL sideloading and a malicious DLL named Claimloader.
The executable, often renamed to appear legitimate, triggers the infection chain when launched.
Claimloader is a sophisticated malware loader, now updated to use TripleDES encryption for its embedded payload, a feature observed in variants from late April 2025 onward.
It establishes persistence by creating a registry entry under “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run,” ensuring the malware launches at every user login.
Claimloader then decrypts its payload in memory and injects it using native Windows APIs, such as LdrLoadDll() and LdrGetProcedureAddress(), while also employing XOR-encrypted API names to evade detection.
The primary payload, Pubload, is a backdoor capable of downloading and executing further shellcode. One of its first actions is to deploy Pubshell, a lightweight reverse shell that grants attackers immediate access to the infected system.
Pubload’s routines remain essentially unchanged from previous reports, but its integration with Claimloader’s advanced evasion and persistence techniques makes it a formidable threat.
Hive0154’s campaign demonstrates a clear trend: cyber threat actors are increasingly leveraging geopolitical tensions and community-specific interests to maximize their chances of successful infiltration.
Organizations, particularly those affiliated with the Tibetan community or involved in related advocacy, are advised to remain vigilant. Key recommendations include:
As Hive0154 and similar groups continue to refine their tactics, robust cybersecurity practices and real-time threat intelligence remain essential for defense.
| Indicator | Indicator Type | Context |
| 2bd60685299c62abe500fe80e 9f03a627a1567059ce213d7c0cc 762fa32552d7 | SHA256 | Claimloader DLL |
| c80dfc678570bde7c19df21877a1 5cc7914d3ef7a3cef5f99fce26fcf6 96c444 | SHA256 | Claimloader DLL |
| 93f1fd31e197a58b03c6f5f774c138 4ffd03516ab1172d9b26ef5a4a328 31637 | SHA256 | Claimloader DLL |
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…