Current Cyber Threats

China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations

Summary:
The House Select Committee on China has issued a formal advisory warning of an ongoing series of cyber espionage operations linked to the People’s Republic of China during the current period of tense U.S.–China trade negotiations. According to the committee, these operations are focused on compromising organizations and individuals tied to trade policy and diplomacy. The targets include U.S. government agencies, American business associations, Washington D.C. law firms, think tanks, and at least one foreign government. One of the primary tactics observed involved Chinese-linked actors impersonating Congressman John Robert Moolenaar of Michigan. Moolenaar, who is a well-known critic of Beijing, was used as a lure in phishing campaigns. Messages were sent in his name asking recipients to provide input on proposed sanctions against China. The emails contained an attached file that appeared to be a draft version of legislation. Once opened, the file delivered malware that enabled the attackers to collect sensitive data and maintain long-term access to the victim systems. By choosing to impersonate a sitting Congressman with a history of outspoken criticism of Beijing, the attackers increased the likelihood that their message would appear credible and urgent to recipients.

The committee explained that the ultimate goal of the campaign was to steal data while disguising the intrusion by abusing common software and cloud platforms. This allowed the threat actors to hide their activity, a technique frequently used by state-sponsored groups to minimize detection. The campaign has been attributed to APT41, a well-documented Chinese espionage group known for targeting a wide range of industries and geographies. The Chinese government has denied involvement, stating that it opposes cyberattacks of any form and criticizing what it described as unsubstantiated accusations. Nonetheless, the committee has stated that the timing, techniques, and scale of the operations match patterns of state-backed espionage campaigns designed to influence U.S. policymaking.


Security Officer Comments:
The campaign demonstrates China’s continued reliance on advanced spear phishing and social engineering as entry points for espionage activity. Impersonating Congressman Moolenaar gave the operation both legitimacy and urgency, exploiting the trust relationships between lawmakers, policy experts, and trade groups. The use of fake legislative documents shows the high degree of tailoring applied to make the phishing believable. APT41’s preference for cloud-based services and Microsoft 365 credential theft highlights the group’s adaptability to enterprise environments where traditional perimeter defenses are less effective. The repeated focus on trade policy and strategic industries such as port infrastructure indicates a deliberate attempt to gather intelligence that could strengthen China’s negotiating position and longer-term economic strategy.


Suggested Corrections:


Organizations can make APT groups’ lives more difficult. Here’s how:
  • Defense-in-depth strategy: A comprehensive defense-in-depth strategy is crucial to combat APTs. This includes implementing multiple layers of security controls, such as strong perimeter defenses, network segmentation, endpoint protection, intrusion detection systems, data encryption, access controls, and continuous monitoring for anomalies.
  • Threat intelligence and sharing: Ideally, organizations should actively participate in threat intelligence sharing communities and collaborate with industry peers, government agencies, and security vendors. Sharing information about APTs and their techniques can help detect and mitigate attacks more effectively.
  • Employee education and awareness: Regular security awareness programs, phishing simulations, and training sessions can educate employees about the latest threats, social engineering techniques, and safe computing practices.
  • Incident response and recovery: Regardless of preventive measures, organizations should have a well-defined incident response plan. This includes incident detection, containment, eradication, and recovery procedures to minimize the impact of APT attacks and restore normal operations.

Link(s):
https://thehackernews.com/2025/09/china-linked-apt41-hackers-target-us.html