Frequently Asked Questions

ShadowPad Malware: Technical Details & Threat Actor Usage

What is ShadowPad and how does its modular architecture work?

ShadowPad is a privately sold, modular backdoor malware platform used primarily for espionage. Its architecture is based on a shellcode loader that decrypts and loads a Root plugin, which in turn loads other embedded plugins into memory. Additional plugins can be dynamically uploaded from the command-and-control (C&C) server during runtime, allowing threat actors to add or remove functionalities as needed. This modularity enables highly customizable and stealthy operations.

How are plugins managed and deployed in ShadowPad?

Plugins in ShadowPad are managed via a controller interface. The default set of plugins (such as Root, Plugins, Config, Install, Online, TCP, HTTP, UDP, and DNS) are embedded in most samples. Additional plugins can be uploaded to infected hosts during runtime, but only those produced by the original developer can be used through the controller. The builder allows the seller to control which plugins are included in each sample, and buyers typically purchase only the plugins they need.

What unique features does the ShadowPad controller provide to threat actors?

The ShadowPad controller, written in Delphi, enables threat actors to generate shellcodes, manage infected hosts, control C&C listeners, and build new ShadowPad shellcode pieces. It provides an interface for plugin management, file transfer monitoring, and campaign customization (including anti-debugger settings, installation options, process injection, and configuration import/export). This level of control is relatively unique among malware platforms used by Chinese espionage groups.

How are ShadowPad plugins sold and distributed to buyers?

ShadowPad plugins are typically sold separately, not as a full bundle. Buyers select and purchase only the plugins they require, and the seller controls which functionalities are available. Most samples contain fewer than nine plugins, while fully packaged versions with more than 16 plugins are likely reserved for select customers or closed groups. This sales model allows the seller to tightly control the distribution and capabilities of ShadowPad instances.

Which threat actors and groups have been identified using ShadowPad?

At least five activity clusters have been identified using ShadowPad, including APT41 (BARIUM and LEAD subgroups), Tick, Tonto Team, Operation Redbonus, Operation Redkanku, and Fishmonger. These groups have used ShadowPad for supply chain attacks, long-term espionage, and targeting sectors such as gaming, electronics, universities, telecommunications, NGOs, and government organizations. Other possible users include LuckyMouse and Tropic Trooper, though attribution is challenging due to the private sales model.

How do threat actors use ShadowPad for long-term espionage?

Threat actors deploy ShadowPad on high-privilege systems such as Active Directory servers or domain controllers to reduce detection risk. Its modular design allows them to maintain persistent access, exfiltrate data, and dynamically add new capabilities as needed. Groups like Tick and Fishmonger have used ShadowPad for extended monitoring and information gathering in victim environments.

What is the significance of the shift from developing to acquiring backdoors among Chinese espionage groups?

The adoption of privately sold malware like ShadowPad marks a shift from developing custom backdoors to acquiring advanced, well-supported platforms. This reduces operational costs and development time for threat actors, while also making attribution more difficult for defenders. Shared malware platforms like ShadowPad and Cobalt Strike complicate campaign identification and enhance the capabilities of espionage groups.

How does ShadowPad's plugin system affect its detection and attribution?

ShadowPad's plugin system allows threat actors to customize each deployment, embedding only the plugins they need and uploading others as required. This variability, combined with advanced obfuscation techniques, makes detection and attribution more challenging for defenders. The ability to remove or add functionalities on the fly further complicates analysis and response efforts.

What are some notable campaigns or incidents involving ShadowPad?

Notable campaigns include supply chain attacks against NetSarang, ASUS, and CCleaner, where ShadowPad was used as the primary backdoor. In these incidents, highly customized versions of ShadowPad were deployed, with advanced packing and unique plugin configurations. Other campaigns have targeted Indian institutions, universities, and organizations involved in COVID-19 research.

How do threat actors obtain additional ShadowPad plugins?

Threat actors can obtain additional ShadowPad plugins by purchasing them from the seller or developer. Only plugins produced by the original developer can be used through the ShadowPad controller, and the seller controls which plugins are available to each buyer. Plugins must be encrypted and compressed in the correct format to be recognized and loaded by the malware.

What is the role of the builder in the ShadowPad platform?

The builder in the ShadowPad platform allows the seller or developer to generate customized shellcode samples, configure campaign codes, set anti-debugger and installation options, manage process injection, and specify C&C servers and connection modes. It also supports configuration import/export, giving the seller granular control over each ShadowPad instance distributed to buyers.

How does ShadowPad's private sales model impact the threat landscape?

ShadowPad's private sales model means that only select threat actors and groups have access to the platform, and the seller can control which functionalities are available to each customer. This exclusivity increases the sophistication of attacks and complicates attribution, as multiple groups may use similar but uniquely configured versions of ShadowPad.

What steps can organizations take to detect and defend against ShadowPad?

Organizations should conduct proactive scanning and periodic health checks on high-privilege hosts, such as Active Directory servers and domain controllers, to detect ShadowPad footprints. Implementing advanced threat detection, monitoring for unusual plugin activity, and validating security controls with platforms like Cymulate can help identify and mitigate ShadowPad infections.

Why is attribution of ShadowPad campaigns particularly challenging?

Attribution is challenging because ShadowPad is sold privately to a limited set of customers, and each instance can be uniquely configured with different plugins and obfuscation techniques. Multiple threat groups may use similar versions, and the seller's control over distribution further obscures links between campaigns and actors.

How does ShadowPad compare to other backdoors like PlugX?

ShadowPad is considered a potential successor to PlugX, offering more advanced modularity, plugin management, and a sophisticated controller interface. While PlugX was also used by Chinese espionage groups, ShadowPad's private sales model and dynamic plugin system provide greater flexibility and control for threat actors.

What is the relationship between ShadowPad developers and threat actors?

The developers of ShadowPad, including individuals like 'whg' and Rose, have a history of monetizing malware development and selling their tools to select customers. Some developers have direct affiliations with threat groups such as APT41, and their control over plugin distribution ensures that only authorized buyers can access specific functionalities.

How do threat actors use ShadowPad to evade detection?

Threat actors use ShadowPad's advanced obfuscation techniques, dynamic plugin loading, and selective deployment on high-privilege systems to evade detection. Custom packing (e.g., VMProtect) and the ability to add or remove plugins during runtime make it difficult for defenders to identify and analyze infections.

What are the main functionalities provided by ShadowPad plugins?

The main functionalities provided by ShadowPad plugins include backdoor installation, C&C communications (TCP, HTTP, UDP, DNS), file transfer, configuration management, privilege escalation, and additional espionage capabilities. The exact set of functionalities depends on which plugins are embedded or uploaded by the threat actor.

How does ShadowPad's plugin management differ from open attack frameworks?

Unlike open attack frameworks, ShadowPad's plugin management is tightly controlled by the developer or seller. Only authorized plugins can be used, and the controller does not allow users to add new control interfaces for third-party plugins. This ensures that only plugins produced by the original developer are supported, limiting the risk of unauthorized modifications.

Cymulate Platform: Features, Security, and Use Cases

What is Cymulate's Exposure Management Platform and how does it help defend against threats like ShadowPad?

Cymulate's Exposure Management Platform enables organizations to proactively validate their security controls, simulate real-world threats (including advanced malware like ShadowPad), and prioritize remediation efforts. By continuously testing defenses and providing actionable insights, Cymulate helps organizations identify exploitable exposures and strengthen their overall security posture. Learn more.

What are the key capabilities of Cymulate's platform?

Cymulate offers continuous threat validation, unified breach and attack simulation (BAS), continuous automated red teaming (CART), exposure analytics, attack path discovery, cloud validation, and an extensive threat library with daily updates. These capabilities enable organizations to validate their defenses against the latest threats and optimize their security controls. Source.

How does Cymulate's platform differ from traditional security validation tools?

Cymulate provides a unified platform that integrates BAS, CART, and exposure analytics, reducing complexity compared to tools that focus on only one area. It offers 24/7 automated attack simulations, AI-powered prioritization, and continuous innovation with bi-weekly feature updates. Customers report measurable improvements such as a 52% reduction in critical exposures and an 81% reduction in cyber risk within four months. See comparison.

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across organizations of all sizes and industries. It is especially valuable for teams seeking to improve visibility, prioritize exposures, automate testing, and communicate risk with quantifiable metrics. Learn more.

What security and compliance certifications does Cymulate hold?

Cymulate is certified for SOC2 Type II, ISO 27001:2013 (Information Security Management), ISO 27701 (Privacy Information Management), ISO 27017 (Cloud Services Security), and CSA STAR Level 1. These certifications demonstrate Cymulate's commitment to security, privacy, and cloud compliance. More info.

How easy is it to implement Cymulate and start using it?

Cymulate operates in agentless mode, requiring no additional hardware or complex configurations. Customers report that deployment is quick and straightforward, with simulations running almost immediately after setup. Comprehensive support is available to ensure a smooth onboarding process. Customer story.

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected for testing. For a personalized quote, you can schedule a demo with the Cymulate team.

What integrations does Cymulate support?

Cymulate integrates with leading security technologies, including CrowdStrike Falcon, Cisco Secure Endpoint, BlackBerry Cylance PROTECT, AWS GuardDuty, Check Point CloudGuard, Akamai Guardicore, and CrowdStrike Falcon Spotlight. For a full list, visit the partnerships and integrations page.

What business impact can customers expect from using Cymulate?

Customers report an 81% reduction in cyber risk within four months, a 60% increase in operational efficiency, 40X faster threat validation, a 30% improvement in threat prevention, and a 52% reduction in critical exposures. These outcomes are supported by customer case studies such as Hertz Israel. Read the case study.

How does Cymulate support a threat-informed defense strategy?

Cymulate continuously validates security controls against the latest threats and attack techniques, ensuring defenses are always prepared for current and emerging adversarial methods. This supports a threat-informed defense and helps organizations stay ahead of evolving risks. Learn more.

What technical documentation is available for Cymulate?

Cymulate provides whitepapers, guides, solution briefs, data sheets, and industry reports covering topics such as exposure management, CTEM, vulnerability management, detection engineering, and threat exposure validation. These resources are available in the Resource Hub.

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly platform and actionable insights. Testimonials highlight the ease of implementation, accessible support, and the ability to quickly identify and remediate security gaps. See testimonials.

How does Cymulate address the pain points of security teams?

Cymulate addresses challenges such as overwhelming threat volumes, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers. It provides continuous threat validation, actionable insights, automation, and unified reporting to help teams focus on what matters most. Learn more.

What is Cymulate's approach to privacy and GDPR compliance?

Cymulate adopts a holistic approach to GDPR, incorporating data protection by design and maintaining a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO). The platform is hosted in secure AWS data centers with strong encryption and high availability. More info.

How does Cymulate help organizations communicate risk to stakeholders?

Cymulate provides validated exposure scoring and quantifiable metrics tailored to different roles, enabling CISOs and security leaders to justify investments and communicate risk effectively to stakeholders. Learn more.

What is Cymulate's mission and vision?

Cymulate's mission is to revolutionize cybersecurity by fostering a proactive approach to managing security threats. The company aims to empower organizations to effectively manage their security posture and improve resilience against threats. About us.

How does Cymulate support continuous threat exposure management (CTEM)?

Cymulate enables organizations to implement CTEM by integrating validation into prioritization and mobilization, fostering collaboration across teams, and providing continuous, actionable insights to reduce breach risk. Learn more.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Shadowpad - Privately sold malware espionage tool

August 22, 2021

ShadowPad is a modular backdoor - each plugin contains specific functionality that can be 'plugged' or 'unplugged' during runtime - in shellcode format. It also allows dynamic loading of additional plugins which are not initially embedded in the sample from the C&C server. ShadowPad is a modular backdoor in shellcode format. On execution, a layer of an obfuscated shellcode loader is responsible for decrypting and loading a Root plugin. While the sequence of operation in the Root plugin decrypts, it loads other plugins embedded in the shellcode into memory. Along with the plugins embedded in the sample, additional plugins are allowed to be remotely uploaded from the C&C server, which allows users to dynamically add functionalities not included by default. As luck would have it, the ShadowPad controller was accidentally discovered during private research. All of the stakeholders involved agreed to releasing screenshots but not the details of the actual file, so analysts unable to provide hashes for this component at present. Analysis of the controller allowed to obtain a clear picture of how the builder generates the shellcodes, how the users manage the infected hosts, and the kinds of functions available on the controller. Written in Delphi, it has the capability to both generate malware and control backdoor communications. The controller provides an interface to manage infected hosts, manage C&C server listeners and build new ShadowPad shellcode pieces. This is a relatively unique characteristic of malware used by Chinese espionage threat actors. -Transfer: The transferring progress of files which are currently being transferred from and to the infected hosts. -Listen: To control the C&C listeners and the protocols in use. Setting: Intended to be a setting panel, but there is no option on the list in this version. -Builder: The ShadowPad shellcode builder. The main page of the controller. • Users: The list of infected hosts. • Transfer: The transferring progress of files which are currently being transferred from and to the infected hosts. • Listen: To control the C&C listeners and the protocols in use. • Setting: Intended to be a setting panel, but there is no option on the list in this version. • Builder: The ShadowPad shellcode builder. The user can choose to enter the management console of a single infected computer. The console allows the user to manage the plugin list and use the functions of each plugin. The plugins "Root" to "Http" are embedded in the samples by default. If the user wants to use the functions of other plugins, those plugins need to be uploaded to the infected computer. The plugin management page. The user can add or remove a plugin.Fig 5: The popup message of asking the user to upload a plugin. The builder allows the user to modify the campaign code and notes, anti-debugger settings, installation settings (service and register), process injection settings, C&C servers and connection modes. It also contains configuration import and export functionalities. The builder in ShadowPad controller. An intriguing question to address is whether ShadowPad is a privately shared attack framework or a privately developed modular malware platform for sale to specific groups. Its design allows the users to remotely deploy new plugins to a backdoor. In theory, anyone capable of producing a plugin that is encrypted and compressed in the correct format can add new functionalities to the backdoor freely. However, the control interfaces of the plugins are hardcoded in the "Manager" page of the ShadowPad controller, and the controller itself does not include a feature to add a new control interface. In other words, it is unlikely that ShadowPad was created as a collaborative attacking framework. Only the plugins produced by the original developer could be included and used through the ShadowPad controller. On the other hand, even if the control interface of a plugin is listed in the menu, not every available plugin is embedded in the ShadowPad samples built by the controller by default. Once a plugin is not included in the compiled sample, the user needs to upload the corresponding plugin (encrypted and compressed in the correct format) and place it in the "Plugins" directory in the package during runtime on the client side. There is no configuration in the builder to allow the user to choose which plugins are compiled into the generated sample, so this setting can only be managed by the developer of the controller. Any functionality can be easily removed from the bundle by removing the corresponding plugin from the directory. If ShadowPad was not originally designed as an open framework, the following question is whether it is freely shared with or sold to its users. The possible author 'whg' - and one of his close affiliates, Rose, who will be introduced in the following section - have been monetizing their malware development and hacking skills. Both individuals sold self-developed malware, and Rose offered services such as software cracking, penetration testing and DDoS attacks6. If ShadowPad was developed by them or their close affiliates, it is more likely to be sold to - rather than freely shared with - other users under this context. As discussed, the available functionalities to ShadowPad users are highly controlled by the seller of ShadowPad. Looking deeply into the plugin numbers and the distribution of different plugins embedded in around a hundred samples, analysts assessed that the seller is likely selling each plugin separately instead of offering a full bundle with all of the currently available plugins. In other words, a buyer needs to pick how many plugins they need and acquire them from the seller. The seller does not provide all the functionality or capabilities by default. Most of the samples contain less than nine plugins with the following plugins embedded: Root, Plugins, Config, Install, Online, TCP, HTTP, UDP and DNS. This set of plugins can only support the installation of backdoors and communications with C&C servers, without providing further functionality. Actors owning samples with more than 16 plugins, which are all packed by the same loader and are likely to be used by a single closed group, are likely to be offered as 'fully packaged' versions of ShadowPad with the specially configured builders that can build samples with a full set of plugins. In other cases, the actors can only compile ShadowPad backdoors with the basic set of plugins. They need to manually upload other plugins if they want to use other functionalities. During research, analysts found Tick - one of the threat groups with access to ShadowPad - developed a tool to extract the list of installed software information on an infected host while a plugin of ShadowPad with the same functionality - the plugin "Software" - was discovered in a sample used by another threat group in a similar time frame. This shows that not every customer of ShadowPad decides to (or is able to) obtain all of the available plugins. The plugins are likely to be provided separately. The number of plugins embedded in the samplesSample Number 0102030405060012345678910111213141516171819 WHAT THREAT ACTORS ARE USING SHADOWPAD?Despite being the potential successor to PlugX, ShadowPad is sold privately to a limited set of customers. Analysts have identified at least 5 activity clusters of ShadowPad users. APT41APT41 is the accepted naming convention for the activities conducted by two spinoffs of what was once referred to as 'Winnti', sub-groups - BARIUM (Tan Dailin aka Rose and Zhang Haoran) and LEAD (Chengdu 404 Network Technology Co., Ltd). All of the individuals are based in Chengdu, Sichuan. Rose, Zhang Haoran, and Jiang Lizhi (AKA "BlackFox", one of the responsible persons of Chengdu 404) were coworkers. One of the actors, Rose - started his active collaboration on malware development with whg, the author of PlugX, when he was a member of the hacking group NCPH. They developed "NCPH Remote Control Software" together. The executable of the controller was freely shared on NCPH websites, but they also declared that the source code was for sale. Aside from this, NCPH offered customized services of software cracking, malware development and penetration testing. Both Rose and whg were monetizing their malware development skills back in the day. BARIUM (Rose and Zhang Haoran) were one of the earliest threat groups with access to ShadowPad. Aside from some smaller-scale attacks against the gaming industry, they were accountable for several supply chain attacks], some of their victims included NetSarang, ASUS, and allegedly, CCleaner. In the aforementioned incidents, the actors used ShadowPad as the primary backdoor of the intrusion after the initial infection phases. During the supply chain attack against ASUS, the samples of ShadowPad were highly customized compared to other ShadowPad samples analysts analyzed. Every layer of shellcode and plugin was packed with VMProtect, and the plugins had different plugin numbers. Another subgroup, LEAD, also used ShadowPad along with other backdoors to attack victims for both financial and espionage purposes. They were reported to attack electronic providers and consumers, universities, telecommunication, NGO and foreign governments.Considering the long-term affiliation relationship between Rose and whg, analysts suspect that Rose likely had high privilege access to - or was a co-developer of - ShadowPad, and other close affiliates in Chengdu were likely sharing resources. This could also explain why BARIUM was able to utilize a special version of ShadowPad in some of their attacks. TICK AND TONTO TEAMTick and Tonto Team. These two groups amalgamated into a new institution during the reorganization of the PLA, and soon thereafter analysts identified significant resource sharing between them, such as the overlaps of C&C infrastructure and the utilities of similar toolsets. A noticeable change after the merge was that they started to use ShadowPad as their primary backdoor for conducting intrusion activities. In the past, they were known to develop their own backdoors for their operations. The threat group conducted several operations with ShadowPad as the primary backdoor. Internally, they called ShadowPad "Casper", according to the PDB strings extracted from the customized loaders. Tick crafted and sent spear phishing emails to deliver ShadowPad in victims' networks for information exfiltration and long-term espionage. They exploited CVE-2019-948919 and CVE-2020-846820 in Trend Micro's security solutions that were exposed to the Internet, in order to deliver ShadowPad into internal networks for further exploitation. Based on the sample sets analysts collected, Tick used at least five different versions of ShadowPad; however, all of the samples only contained the basic set of plugins. Although they turned from self-developed backdoors to the acquired or leaked backdoors, they still developed some customized tools for intrusion, such as a modified mimikatz, a screen capture tool, a packet transmission tool, a tool to list the software installed on a computer, and a VBScript command execution tool. For instance, analysts uncovered a VBScript command execution tool builder which can generate a payload of VBScript with built-in evasion techniques to bypass TrendMicro products. The self-developed tool to list the software strongly suggests that Tick was unable to obtain all of the available plugins, since a plugin with the same functionality was available at that time. OPERATION REDBONUS Analysts caught a ShadowPad activity cluster that had no clear link to known threat groups. Analysts tracks the activities of this cluster under the moniker 'Operation Redbonus'. All the samples analysts collected from Operation Redbonus were running the same version of ShadowPad. During investigations, analysts also spotted other backdoors in use, such as Whitebird22, IceFog and a customized instance of PCShare. The actors behind this cluster appear to show interest in Indian targets with several DDNS domains spoofing some Indian institutions. OPERATION REDKANKU There is another small set of ShadowPad samples without clear attributions in the public domain. All of the C&C servers extracted from the samples had a self-signed certificate b41948daacd4c081a58a14aa51c37af21738447b installed. Whilst further attribution or overlaps are not available at the time of writing, some related samples were documented to be a part of the ProxyLogon attacks according to a report by ESET FISHMONGER Another activity cluster - tracked by researchers as Fishmonger. The cluster is tracked based on the overlap of infrastructure and indicators, as well as some behavioral connections between different campaigns. In past, the actors used a special version of ShadowPad which allowed them to generate samples with a handful of plugins embedded by default. Later, they gained access to a new version of ShadowPad which had updates and more advanced obfuscation techniques. They are now using it and another backdoor called Spyder as their primary backdoors for long-term monitoring26, while they distribute other first-stage backdoors for initial infections including FunnySwitch, BIOPASS RAT, and Cobalt Strike. The victims include universities, governments, media sector companies, technology companies and health organizations conducting COVID-19 research in Hong Kong, Taiwan, India and the US. OTHERS Some public reporting detail other possible users of ShadowPad, including LuckyMouse (ESET) and Tropic Trooper (PwC). However, analysts do not have visibility of this activity. ASSESSMENT Apart from the threat groups and activity clusters detailed above, there are still some unattributed ShadowPad samples in the sample set analysts collected and analyzed. The nature of privately sold backdoors requires more context to begin analytically-sound attribution. There might be other unidentified actors using this backdoor, and it requires a rigorous approach when attempting to attribute ShadowPad campaigns.Since ShadowPad is a powerful backdoor with a complete set of functionalities, a number of its users (for instance, Tick and Fishmonger) deploy ShadowPad for the purpose of long-term espionage in victim environments. Threat actors using ShadowPad select systems with high privileges on networks to reduce the probability of detection, such as AD servers or domain controllers. Proactive scanning and periodical health checks on high-privilege hosts are essential to discover the footprints of attackers. LANDSCAPE SHIFT: FROM DEVELOPING BACKDOORS TO ACQUIRING BACKDOORSIt is not a secret that a number of Chinese threat actors develop their own tool sets based on their needs during operations. However, established espionage threat actors also acquire tooling to add to their arsenals. Tick was one of the most active users of ShadowPad according to research. Prior to this, Tick was documented to be using self-developed backdoors including Darsef, xxmm and Datper. A noticeable change analysts discovered during the monitoring of the threat group was that the actors later stopped the use of other self-developed backdoors after actively using ShadowPad (which they called Casper). This example of the shift from 'home-brewed' backdoors to acquired malware marks a noticeable change influenced by the privately sold malware platform ShadowPad. Acquiring a well-designed piece of malware significantly reduces the cost of operation and human resource needed to develop the malware in-house. The service provider also keeps enhancing the stability and usability of the backdoor with new features added, unlike much of the commodity malware found in cybercriminal circles or underground forums. Furthermore, the usage of shared malware provides espionage threat actors a layer of security in that it makes attribution much more difficult for defenders. The popularity of malware such as ShadowPad and Cobalt Strike among Chinese espionage groups makes campaign identification significantly harder.