• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Zero Day Quest returns: Microsoft ups the stakes with $5M bug bounty

 | 

Cisco disclosed a CRM data breach via vishing attack

 | 

Exposed Without a Breach: The Cost of Data Blindness

 | 

SonicWall investigates possible zero-day amid Akira ransomware surge

 | 

Chaining NVIDIA's Triton Server flaws exposes AI systems to remote takeover

 | 

Hacking group D4rk4rmy claimed the hack of Monte-Carlo Société des Bains de Mer

 | 

Northwest Radiologists data breach hits 350,000 in Washington

 | 

PlayPraetor Android RAT expands rapidly across Spanish and French-speaking regions

 | 

Lovense flaws expose emails and allow account takeover

 | 

Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024

 | 

Akira Ransomware targets SonicWall VPNs in likely zero-day attacks

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 56

 | 

Security Affairs newsletter Round 535 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

New Linux backdoor Plague bypasses auth via malicious PAM module

 | 

China Presses Nvidia Over Alleged Backdoors in H20 Chips Amid Tech Tensions

 | 

Malicious AI-generated npm package hits Solana users

 | 

Meta Offers $1M bounty at Pwn2Own Ireland 2025 for WhatsApp exploits

 | 

ToolShell under siege: Check Point analyzes Chinese APT Storm-2603

 | 

CISA released Thorium platform to support malware and forensic analysis

 | 

Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • APT
  • Breaking News
  • Hacking
  • Intelligence
  • Security
  • OneClik APT campaign targets energy sector with stealthy backdoors

OneClik APT campaign targets energy sector with stealthy backdoors

Pierluigi Paganini June 27, 2025

A OneClik campaign, likely carried out by China-linked actor, targets energy sectors using stealthy ClickOnce and Golang backdoors.

Trellix cybersecurity researchers uncovered a new APT malware campaign, OneClik, targeting the energy, oil, and gas sectors. It abuses Microsoft’s ClickOnce deployment tech and custom Golang backdoors. While links to China-affiliated actors are suspected, attribution remains cautious.

Threat actors behind the campaign use stealthy “living off the land” tactics and cloud services to evade detection. They deploy Golang backdoors via .NET loaders abusing Microsoft ClickOnce, the campaign shows progressive evolution in evasion techniques, including anti-debugging and sandbox detection. Communication is hidden behind AWS services, making detection highly challenging.

“This stealthy operation unfolds across three distinct variants (v1a,BPI-MDM, andv1d), each using a .NET-based loader (“OneClikNet”) to deploy a sophisticated Golanguage backdoor (“RunnerBeacon”) that communicates with threat actor infrastructure hidden behind legitimate AWS cloud services [3] (CloudFront, API Gateway, Lambda).” reads the report published by Trellix. “This makes network-based detection nearly impossible without decryption or deep behavioral analysis.”

The OneClik campaign abuses Microsoft’s ClickOnce, normally used for easy app installation, to stealthily deliver malware. Attackers send phishing emails with links to fake “hardware analysis” tools. When clicked, a disguised ClickOnce app silently installs malware using trusted Windows processes (like dfsvc.exe) to avoid raising alarms.

ClickOnce APT malware campaign

By hijacking the .NET configuration (AppDomainManager injection), attackers make legitimate apps load malicious code. This method avoids requiring admin rights and blends in with normal system activity. Eventually, it loads an advanced Golang backdoor called RunnerBeacon, allowing attackers to spy on or control infected systems.

RunnerBeacon communicates with C2 servers via HTTP, WebSockets, TCP, and SMB. It can execute commands, manage files, escalate privileges, and move laterally. It includes anti-analysis features and supports port scanning, forwarding, and SOCKS5 proxying. Its design resembles Geacon, a Go variant of Cobalt Strike, suggesting it may be a stealthier, cloud-optimized fork or private version.

The campaign’s C2 infrastructure cleverly abuses AWS services to masquerade into legitimate traffic. In v1a variant, the beacon communicated via a CloudFront domain and API Gateway in eu-west-2, making its traffic indistinguishable from normal CDN use. In v1d variant, AWS usage evolved, beacons hit an AWS Lambda function URL as their callback endpoint, meaning the entire C2 channel operated through trusted AWS domains. This “hide in the cloud” tactic makes detection extremely difficult, as defenders must decrypt SSL or block large swaths of AWS traffic, which is rarely feasible. Over time, v1a variant relied on static AES keys, minimal sandbox checks, and no anti-debugging. BPI-MDM added debugger detection and local second-stage loading. The latest v1d includes robust environment checks—domain/Azure AD validation, memory checks, file deletion and uses fully serverless C2 via Lambda. Throughout all variants, the attack leverages .NET AppDomain hijacking for stealth and persistence.

The RunnerBeacon loader was found in a Middle Eastern oil and gas target in September 2023, sharing 99% of its code with OneClik, suggesting a long-term campaign aimed at the energy sector. It uses .NET AppDomainManager hijacking, in-memory AES-encrypted payloads, and cloud infrastructure (AWS, Alibaba) to evade detection—techniques often linked to Chinese APTs. While attribution to APT41 remains low-confidence, defenders should focus on recognizing these persistent TTPs.

“Notably, OneClik’s’s use of a .NET-based loader, AppDomainManager hijacking, and in-memory decryption echoes techniques reported in Chinese APT operations.” concludes the report that also includes indicators of compromise (IoCs). “Despite the strong overlap in techniques, we emphasize a cautious attribution stance. We assess a possible with low-confidence link between OneClik and Chinese threat actors such as APT41. In the absence of “smoking gun” indicators, we refrain from definitively attributing OneClik to any specific threat actor or nation.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, backdoor)


facebook linkedin twitter

APT ClickOnce APT malware campaign Hacking hacking news information security news IT Information Security malware Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini August 05, 2025
Zero Day Quest returns: Microsoft ups the stakes with $5M bug bounty
Read more
Pierluigi Paganini August 05, 2025
Cisco disclosed a CRM data breach via vishing attack
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Zero Day Quest returns: Microsoft ups the stakes with $5M bug bounty

    Hacking / August 05, 2025

    Cisco disclosed a CRM data breach via vishing attack

    Data Breach / August 05, 2025

    Exposed Without a Breach: The Cost of Data Blindness

    Security / August 05, 2025

    SonicWall investigates possible zero-day amid Akira ransomware surge

    Security / August 05, 2025

    Chaining NVIDIA's Triton Server flaws exposes AI systems to remote takeover

    Security / August 05, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT