Discussion about this post

User's avatar
Decisive Liberty's avatar

UPDATE on COATHANGER via Grok ...

"COATHANGER" refers to a sophisticated remote access trojan (RAT) malware deployed by state-sponsored Chinese hackers in a widespread cyber espionage operation.

The malware targets Fortinet's FortiGate firewalls and network security appliances, allowing persistent access even after reboots or security updates.

Dutch intelligence agencies (MIVD and NCSC) first publicly attributed the attacks to China in early 2024, describing it as a stealthy backdoor that hooks system calls to evade detection and deletes traces from virus scans.

The campaign exploited a known vulnerability (CVE-2022-42475) in FortiOS SSL-VPN, a critical flaw enabling remote code execution.

This operation is part of broader Chinese state-backed cyber activities, but COATHANGER stands out for its focus on critical infrastructure and defense sectors.

It's distinct from other Chinese-linked malware like BOLDMOVE or THINCRUST, though it shares tactics like exploiting Fortinet zero-days.

Timeline of Key Events - Date / Event

OCTOBER 2022 / Hackers begin exploiting CVE-2022-42475 as a zero-day against global targets, including European governments and African MSPs.

2023 (EARLY) Breach of Dutch Ministry of Defence (MOD) network: Attackers infect a research network used by 50 personnel, exfiltrate Active Directory user lists, and conduct reconnaissance.

FEBRUARY 2024 / Dutch agencies (MIVD, AIVD, NCSC) publicly disclose the intrusion, naming the malware "COATHANGER" and attributing it to China with "high confidence." They release a technical report to expose tactics and boost international defenses.

APRIL-JUNE 2024 / Investigations reveal the campaign's scale: At least 20,000 FortiGate devices infected worldwide, including governments, international organizations, defense firms, service providers, consultancies, and critical infrastructure. Infections occurred in a two-month window before Fortinet's patch.

NOVEMBER 2025 (ongoing context) / U.S. DOJ unseals indictments against seven APT31 hackers for related 14-year campaigns targeting critics and U.S. entities, highlighting China's use of contractors for espionage. Separate charges against 12 Chinese contractors (March 2025) and an arrest (July 2025) underscore the network's scope.

>> TARGETS AND IMPACT

Primary Focus:

Dutch military and defense networks initially, but expanded globally to include:

- Governments and international bodies

- Defense and manufacturing companies

- Telecom/service providers and consultancies

- Critical infrastructure sectors

Scale:

More than 20,000 compromised FortiGate systems, with potential "permanent access" post-patch due to COATHANGER's persistence.

Goals:

Cyber espionage—stealing user data, mapping networks, and enabling further intrusions. No ransomware or disruption reported; it's purely intelligence-gathering.

Broader Chinese Context:

This fits into campaigns like APT31 (targeting dissidents and elections) and HAFNIUM (Microsoft Exchange hacks). China uses private contractors (e.g., Anxun Information Technology) to obscure state involvement, casting a "wide net" for exploitable data to sell back to the government.

HOW COATHANGER WORKS

Initial Access:

Exploits vulnerabilities like CVE-2022-42475 to inject code via FortiGate's SSL-VPN.

Deployment:

Downloads from actor-controlled servers; acts as a backdoor for remote commands.

Persistence:

Injects backups into reboot processes; survives updates and hides from CLI scans/logs.

Stealth:

Hooks system calls to block detection; self-deletes from scans.

Capabilities:

Reconnaissance, data exfiltration, and lateral movement. Could pair with future FortiGate flaws.

Experts note COATHANGER's design makes it "conceivably" reusable beyond the initial vuln, urging immediate patching and monitoring.

ATTRIBUTION AND RESPONSES

Attribution:

High-confidence link to PRC state actors by Dutch agencies, based on malware code, infrastructure, and tactics. No specific group named (e.g., not UNC3886), but aligns with Ministry of State Security (MSS) operations.

Official Reactions:

- Dutch Defense Minister Kajsa Ollongren: Emphasized public disclosure to deter China and build resilience.

- U.S. DOJ/FBI: Indictments and rewards (up to $2M) for related hackers, targeting the contractor ecosystem.

- Fortinet: Released patches; urged scanning for indicators of compromise.

Recommendations:

Organizations using FortiGate should apply updates, monitor for anomalous traffic to Chinese IPs, and use EDR tools. Global alerts from CISA/NCSC highlight risks to high-value targets.

This campaign exemplifies escalating PRC cyber threats, with no signs of abatement as of November 2025. For technical details, refer to the MIVD's report.

Expand full comment

No posts