China-Nexus Cyber Espionage Campaign Targeting Qatar Amid Middle East Tensions

Share:

Check Point Research has identified a surge in cyber espionage activity by China-nexus Advanced Persistent Threat (APT) groups targeting Qatar. This shift in focus occurred almost immediately following the escalation of regional tensions in the Middle East in early March 2026. The attackers are leveraging high-profile geopolitical events and breaking news to create highly credible lures, aiming to infiltrate Qatari entities and gather intelligence during a period of rapid regional communication.

Severity: High

Tactical Exploitation Of Regional Conflict

The campaigns are characterized by the use of “conflict-related” lures tailored to the current Middle Eastern environment. By using topics such as military strikes and energy facility security, the actors increase the likelihood of successful social engineering.

Threat Actor Profiles & Malware

The activity is attributed to at least two distinct threat clusters:

Actor / ClusterPrimary MalwareTechnical Details
Camaro Dragon (Earth Preta / Mustang Panda)PlugXA modular backdoor used for file exfiltration, screen captures, and keystroke logging.
Unidentified China-aligned ActorCobalt Strike & Rust-based LoaderUtilizes a previously unseen Rust loader that abuses components of the “NVDA” screen reader.

Campaign Tactics & Infection Chains

1. The Bahrain Missile Strike Lure

Within one day of the regional escalation, attackers deployed a PlugX variant using lures disguised as photos of missile strikes on American bases in Bahrain.

  • Infection Vector: An archive containing a malicious LNK file.
  • Mechanism: The LNK file initiates a chain that abuses DLL hijacking of the legitimate Baidu NetDisk binary to deploy the PlugX backdoor.
  • Attribution Note: This specific configuration and delivery method were previously used against Turkish military targets in late 2024, indicating a consistent Middle Eastern focus.

2. The Gulf Oil & Gas Facility Lure

A second campaign targeted the energy sector using password-protected archives titled “Strike at Gulf oil and gas facilities”.

  • Lure Content: Documents impersonating the Israeli government to add credibility.
  • Mechanism: Employs a Rust-based loader to deliver Cobalt Strike.
  • Unique TTP: Abuse of the open-source screen reader NVDA for side-loading, a technique previously seen in 2025 operations targeting Myanmar and the Philippines.

Strategic Outlook

The shift toward Qatar highlights how major regional developments can reshape Chinese intelligence priorities. Qatar’s role at the intersection of regional conflict and global energy markets makes it a high-value target for opportunistic intelligence collection. Analysts assess with low confidence that the use of infrastructure registered via Kaopu Cloud and Cloudflare aligns with established Chinese-nexus TTPs.

Recommendations

  1. Monitor and flag emails referencing urgent geopolitical or conflict-related topics, which may be used as social engineering lures. Block or quarantine ZIP files containing executable or shortcut files (e.g., .lnk).
  2. Set up EDR alerts for legitimate, signed binaries such as Baidu NetDisk or NVDA components loading unsigned or unexpected DLLs from the same directory.
  3. Ensure robust MFA is active across all external-facing services to prevent threat actors from using exfiltrated credentials for lateral movement.
  4. Provide targeted security awareness training to employees in high-value sectors (Government, Energy, Military) regarding the use of “breaking news” as a psychological trigger for phishing.
  5. Block the IOCs at their respective controls
    https://www.virustotal.com/gui/collection/e9105d04da52243f416b9383fd9c6e4480c639187586ab29b8cdf96be6bdba56/iocs

IOCs – China-Nexus Cyber Espionage Campaign Targeting Qatar Amid Middle East Tensions

SHA-256:4d8027424b5bcd167ab70c8320ce3c5df72a9ecca01246b095e4af498f77725d
SHA-256:fff7864019b651bea2448228d6557d995edc929276bb9d8cb34c3c280a42684e
SHA-256:fa3a1153018ac1e1a35a65e445a2bad33eac582c225cf6c38d0886802481cd43
SHA-256:a7c56033f2264c71b0485da693e3f627b2b5ccfe3399a53cc558be77f95d9c13
SHA-256:c78eb1cecef5f865b6d150adcf67fa5712c5a16b94f1618c32191e61fbe69590
SHA-256:1ddbed0328a60bb4f725b4ef798d5d14f29c04f7ffe9a7a6940cacb557119a1c
SHA-256:26d10996fd2880441445539cd8a6e7fe0777f6ca3352dae6ef84d1d747aabb0c
SHA-256:a9de383c6a1b00c9bd5a09ef87440d72ec7fc4bcd781207b3cace2f246788d4d
SHA-256:b58ec14b0119182aef12d153280962ad76c30e3cd67533177d55481704eba705
SHA-256:a8acb9864e6f64323ed75e69038ca9bfe76f7b1b0d24ec7df8ac07b6dbd641a3
Domain:almersalstore[.]com
IP:185.219.220[.]73
IP:91.193.17[.]117

Source:

  • https://blog.checkpoint.com/research/china-nexus-activity-against-qatar-observed-amid-expanding-regional-tensions/

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Talk to an expert