Picture of Paul Pajo

Paul Pajo

General Manager (Philippines)

This paper analyzes the Earth Kurma Advanced Persistent Threat (APT) campaign, active since 2020, targeting Southeast Asia’s government and telecommunications sectors. It employs custom malware (KRN- RAT, MORIYA rootkit), kernel-level persistence, and cloud-based exfiltration via Dropbox and OneDrive. We examine its tactics, evaluate its impact on national security and infrastructure, and propose mitigation strategies with regional focus. Potential links to APTs like ToddyCat and TA428 are assessed, alongside attribution challenges. Future research includes AI-driven detection, geopolitical studies, and attribution improvements.

Introduction

Advanced Persistent Threats (APTs) are sophisticated, stealthy cyberattacks by well-resourced actors, such as nation-states, aiming to steal data or disrupt systems over time. 

The Earth Kurma APT, identified in 2020, targets Southeast Asia’s government and telecommunications sectors in countries like the Philippines, Vietnam, Thailand, and Malaysia. Using custom malware, rootkits, and cloud exfiltration, it threatens regional security, with increased activity in 2024. 

This paper reviews Earth Kurma’s tactics, assesses its risks, and suggests defenses. It also examines connections to other APTs and emphasizes regional cybersecurity cooperation.

Technical Analysis

Earth Kurma employs advanced methods:

  • Malware and Tools: KRNRAT (remote access trojan), MORIYA (kernel- level rootkit), and KMLOG (keylogger) are used, alongside TESDAT and SIMPOBOXSPY for data theft. 
  • Evasion: Reflective DLL loading, XOR encryption, and living-off-the- land tactics evade detection. 
  • Exfiltration: Data is RAR-compressed and uploaded to Dropbox or OneDrive, mimicking normal traffic. 

These tactics enable prolonged, covert espionage. 

Comparison with Other APT Groups

Earth Kurma resembles other APTs, though attribution remains unclear: 

  • ToddyCat: Shares SIMPOBOXSPY and cloud exfiltration, targeting Southeast Asia since 2020. 
  • Operation TunnelSnake: Uses MORIYA but prioritizes lateral movement over exfiltration. 
  • TA428 (Vicious Panda): Linked via the Ladon framework, suggesting shared tools. 

Tool overlap and obfuscation hinder attribution. 

Impact and Risk Assessment

Earth Kurma’s targets create significant risks: 

  • National Security: Government breaches expose sensitive data to adversaries. 
  • Infrastructure: Telecommunications compromises threaten services like emergency response or banking. 

Its stealth supports ongoing espionage and potential disruption. 

Mitigation Strategies

To counter Earth Kurma: 

  • Threat Detection: Managed detection and response (MDR) systems detect rootkits. Cybots provides regional tools. 
  • Audits: Regular scans and patching address vulnerabilities.
  • Cloud Monitoring: Track suspicious cloud activity. 
  • Access Controls: Least privilege limits data access. 
  • Training: Educate staff on phishing risks.  

Regional threat sharing bolsters defenses. 

Future Areas of Research

Research should target: 

  • AI-driven tools for detecting rootkits and encrypted exfiltration. 
  • Cyberespionage’s geopolitical effects in Southeast Asia . 
  • Forensic methods for APT attribution.  

These enhance cybersecurity. 

Conclusion

Earth Kurma threatens Southeast Asia with advanced cyberespionage. Ties to other APTs and attribution difficulties highlight the need for robust defenses. Mitigation strategies—EDR, audits, and cooperation—paired with research in detection, geopolitics, and attribution, protect against such threats. Vigilance and innovation secure the region’s digital future. 

get the latest threat intelligence and cybersecurity news

Subscribe to our newsletter to get updates on our latest analyst reports, webinars, whitepapers and case studies related to the cybersecurity world.

more cybersecurity updates

The Cyber Risk You Didn’t Buy but Still Own

Outsourcing IT doesn’t outsource your risk. A breach at your vendor’s vendor can still take down your operations, leak customer data, and damage trust. Certifications like Cyber Essentials and Cyber Trust are surfacing hidden dependencies, forcing businesses to confront what they thought was handled. Resilience now means mapping vendors, validating their security, and preparing your own recovery. Cybots helps businesses uncover hidden risks, validate critical assumptions, and prepare for third-party compromises before they make the headlines.

Read More »

Breaches Are Inevitable – PREPAREDNESS IS THE REAL IMMUNITY

Breaches are inevitable, but preparedness is the key to resilience. Beyond firewalls and tools, organizations must train teams to spot early signs, act quickly, and respond together. Clear playbooks, regular drills, and defined roles reduce confusion and speed recovery. Preparedness is the new immunity—the difference between major disruption and swift, controlled response.

Read More »

Strengthening Governance, Risk, and Compliance Frameworks through Advanced Cybersecurity Measures: The Role of Cybots in Enhancing Organizational Resilience in the Philippines 

Philippine organizations, especially MSMEs, face rising cyber risks that threaten compliance and resilience. This article explores how integrating GRC with advanced cybersecurity—and Cybots’ role in enabling it—helps businesses stay secure, responsive, and aligned with the National Cybersecurity Plan.

Read More »

Your Biggest Cyber Risk Might Be a Simple Misconfiguration

A company’s most overlooked cyber risk isn’t always a breach. It’s a misconfiguration. A missing record, a weak setting, or a forgotten exposure—small issues that quietly leave systems open to the internet. They don’t trigger alerts. But when exploited, the consequences are immediate and serious.

Read More »

OUR CYBERSECURITY SOLUTIONS AT A GLANCE