...020, deploying two purpose-built malware families — AppleChris and MemFun — focused on espionage and credential theft. The dual-tool configuration follows an established pattern in Chinese state-aligned intrusion sets: one implant maintains persistent access while the other targets authentication material. Credential harvesting against military networks provides downstream access to classified communications and personnel systems without requiring repeated initial compromise. The five-year...
... operational timeline indicates a long-term collection mandate rather than opportunistic targeting, consistent with strategic intelligence requirements tied to regional military posture and alliance structures. Open sources - closed narratives
...020, deploying two purpose-built malware families — AppleChris and MemFun — focused on espionage and credential theft. The dual-tool configuration follows an established pattern in Chinese state-aligned intrusion sets: one implant maintains persistent access while the other targets authentication material. Credential harvesting against military networks provides downstream access to classified communications and personnel systems without requiring repeated initial compromise. The five-year...