A recent investigation has revealed the activities of an advanced persistent threat (APT) group, dubbed “Operation Sea Elephant,” which has been systematically targeting scientific research institutions in South Asia.
The campaign, attributed to the CNC group, aims to steal critical research data related to oceanography and other scientific fields to bolster the strategic dominance of a South Asian nation in the Indian Ocean region.
Modular and Customized Malware
The CNC group employs highly modular and customized malware, making their operations significantly more effective compared to other APT groups in the region.
Their attack methodology begins with spear-phishing emails directed at researchers and academic institutions.
Once initial access is gained, the attackers use social engineering tactics via instant messaging platforms like WeChat and QQ to spread bait programs across networks.
The malware is tailored to evade detection by antivirus systems, with plugins such as “qaxreporter.exe” deployed in targeted systems.
These plugins are capable of executing remote commands, stealing files, logging keystrokes, and propagating through USB drives.
For instance, the “YoudaoGui.exe” plugin detects new drives and copies itself onto them for further dissemination.
Additionally, CNC’s file-stealing plugins utilize steganographic techniques to exfiltrate sensitive documents securely.

Espionage Objectives
The primary goal of Operation Sea Elephant appears to be the acquisition of sensitive scientific research data.
Documents stolen by the CNC group include studies on geological factors for ocean sequestration, technical collaboration projects on hydraulic headsets, and reports on emerging marine industries.
These documents provide valuable insights into the progress and technical capabilities of South Asian research teams.
By analyzing stolen data, foreign intelligence agencies may infer resource allocation strategies, technical expertise levels, and future research directions of targeted institutions.
While highly confidential projects often remain isolated on Linux server clusters, the CNC group focuses its efforts on Windows-based platforms due to their accessibility and prevalence in academic environments.
According to the researchers, the CNC group leverages sophisticated infrastructure for its operations.
Plugins such as “windowsfilters.exe” use GitHub APIs for remote control functionality, while others communicate with command-and-control (C2) servers via encrypted SSL protocols.
The malware can execute commands like process creation, directory changes, file collection, and remote control functions based on instructions received from C2 servers.
One notable subset of this campaign is UTG-Q-011, which targets fields like laser science and aerospace using resume decoys as initial payloads.
This subset employs open-source plugins for browser data theft alongside modular Trojans capable of compressing stolen files into encrypted archives for exfiltration.
Operation Sea Elephant underscores a broader geopolitical strategy aimed at consolidating dominance in the Indian Ocean region.
Despite ambitious visions for regional leadership, the reliance on espionage suggests gaps in indigenous scientific research capabilities.
The stolen data serves as a reference point for enhancing strategic initiatives but also highlights vulnerabilities in cybersecurity frameworks within academic institutions.
Security vendors have recommended enabling cloud-based threat detection systems to mitigate risks posed by such attacks.
Tools like SkyEye Advanced Threat Detection System and Qi’anxin Threat Intelligence Platform have proven effective in identifying CNC-related malware signatures.
As cyber espionage campaigns continue targeting scientific institutions globally, strengthening security measures remains critical to safeguarding intellectual property and national interests in sensitive research domains.