APT41 — The spy who failed to encrypt me By DCSO CyTec Blog Published: 2023-01-30 · Archived: 2026-04-05 23:50:42 UTC 18 min read Dec 24, 2022 This blog post is based on our recent investigation into one of APT41’s operations against an unnamed German company from the financial sector. The company contacted us in March 2022 after discovering a ransom note (as presented below) on several of its servers. The threat actor tried to encrypt multiple workstations in the client’s environment which was thwarted by Microsoft Defender for Endpoint (MDE). As part of this incident response engagement DCSO’s Incident Response Team (DIRT) supported the client in determining the scope of the incident, identifying the initial attack vector and providing remediation support. Hello. All your servers are encrypted. Please contact: KalajaTomorr@ctemplar.com spare email: KalajaTomorr@firemail.cc Your identity code: ************ Contact us to get the decryption method. You can first understand how to buy Bitcoin and pay. Only we can decrypt, please do not believe any decryption tool. Your recovery method will cause data to be destroyed and irreversible. During this incident response engagement DIRT performed a forensic analysis of multiple servers and workstations which allowed us to determine that: The initial attack vector was a vulnerable “Microsoft Exchange Server”, that was compromised with the help of the“ProxyLogon” exploit. The threat actor used a “China Chopper” web shell to persist on the compromised “Microsoft Exchange Server”. The threat actor laterally moved from the patient zero to a domain controller after performing initial credential dumping activities. The threat actor used a second domain controller as a “base” to stage his encryption attack against workstations and servers in the environment. The threat actor used “Jetico’s BestCrypt” for server encryption and “Microsoft Bitlocker” for the encryption of workstation. https://medium.com/@DCSO_CyTec/apt41-the-spy-who-failed-to-encrypt-me-24fc0f49cad1 Page 1 of 19 The threat actor accessed compromised systems through RDP by exposing the RDP port to the internet with the help of “NATBypass”. Merry Xmas and a Happy New Year from Denis Szadkowski, Johann Aydinbas, Hendrik Bäcker and Jiro Minier. Timeline Press enter or click to view image in full size Simplified Timeline of Security Incident (Timestamps in UTC) https://medium.com/@DCSO_CyTec/apt41-the-spy-who-failed-to-encrypt-me-24fc0f49cad1 Page 2 of 19 Initial Access The threat actor gained initial access in March 2021 by exploiting a chain of vulnerabilities known as “ProxyLogon” ( CVE-2021–26855 , CVE-2021–27065 ). During the forensic examination of the affected system, DIRT found the typical signs of “ProxyLogon” exploitation, which are the execution of the PowerShell Cmdlets Set-OabVirtualDirectory , Remove-OabVirtualDirectory and New-OabVirtualDirectory . Those events were retrieved from the MSExchange Management log (Event ID 1). By exploiting the “ProxyLogon” vulnerability the threat actor was able to drop a “China Chopper” web shell supp0rt.aspx on the client’s exchange server: C:\inetpub\wwwroot\aspnet_client\supp0rt.aspx The contents of the web shell are presented below: