Cybersecurity researchers at SecurityScorecard have uncovered a sophisticated Chinese-linked hacking operation dubbed LapDogs, which has compromised over 1,000 network devices to create an extensive espionage infrastructure. This campaign specifically targets organizations across the United States and Asia-Pacific region, representing a significant threat to critical business sectors and national security interests.
Campaign Timeline and Target Profile
The LapDogs operation commenced in autumn 2023 and continues to expand its reach across multiple strategic sectors. Primary targets include organizations operating in information technology, media, networking technology, and real estate industries. This sector selection suggests a deliberate focus on entities that handle sensitive data or maintain critical infrastructure components.
The geographical scope extends beyond US borders to encompass key Asia-Pacific nations including Japan, South Korea, Hong Kong, and Taiwan. This targeting pattern aligns with typical state-sponsored espionage objectives, indicating potential geopolitical motivations behind the campaign.
ShortLeash Backdoor: Technical Analysis
The threat actors deploy a custom-developed backdoor called ShortLeash, specifically engineered to compromise network routers and establish persistent access. This malware enables attackers to maintain long-term presence within compromised networks while avoiding detection through sophisticated evasion techniques.
A particularly notable aspect of ShortLeash involves its deceptive operational security measures. The backdoor generates self-signed TLS certificates that masquerade as legitimate communications from the Los Angeles Police Department (LAPD). This impersonation technique helps malicious traffic blend with normal network communications, making detection significantly more challenging for security teams.
Vulnerable Infrastructure and Exploitation Methods
Analysis of the compromised infrastructure reveals that Ruckus Wireless access points and Buffalo Technology AirStation wireless routers constitute the majority of infected devices. These specific models were targeted due to their vulnerable SSH services containing critical security flaws.
The attackers exploit two well-documented vulnerabilities: CVE-2015-1548 and CVE-2017-17663. Despite these vulnerabilities being publicly disclosed years ago, numerous devices remain unpatched, creating persistent attack vectors that threat actors continue to leverage effectively.
Connection to Broader Threat Landscape
Security researchers have identified potential connections between LapDogs and another large-scale operation named PolarEdge. The PolarEdge campaign operates an Operational Relay Box (ORB) network comprising over 2,000 compromised routers and IoT devices, active since 2023.
Both operations may be linked to the Chinese APT group UAT-5918, previously associated with high-profile campaigns including Volt Typhoon, Flax Typhoon, Earth Estries, and Dalbit, according to Cisco Talos intelligence reports.
Stealth-Focused Strategy
The LapDogs campaign prioritizes establishing covert, resilient infrastructure rather than conducting disruptive attacks that generate immediate attention. Compromised devices continue operating normally, significantly complicating detection efforts and attribution analysis.
This approach enables sustained presence within target networks while providing flexible infrastructure for various malicious activities. The established network serves as operational cover for future cyber espionage operations, demonstrating sophisticated long-term strategic planning.
The discovery of the LapDogs campaign underscores the critical importance of maintaining updated network equipment and implementing comprehensive network monitoring solutions. Organizations must prioritize securing edge devices that often fall outside traditional security oversight but serve as primary entry points for advanced persistent threats. Regular security patch deployment, combined with modern threat detection capabilities, remains essential for protecting against sophisticated state-sponsored cyber operations targeting critical infrastructure and sensitive business data.