Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

ShadowPad resurgence: SHADOW-EARTH-053 targets Exchange servers

May 6, 2026 | Threat Intelligence Research

Cyber Espionage Campaign Targeting Asia and Europe

TL;DR

Recent activity linked to the SHADOW-EARTH-053 group has revealed a cyber espionage campaign aiming at government and defense organizations across Asia and Europe. Exploiting vulnerabilities in Microsoft Exchange servers, the campaign enables persistent access and extensive post-exploitation capabilities.

Main Analysis

Trend Micro has identified the threat cluster SHADOW-EARTH-053 as being associated with cyber espionage directed at multiple sectors, including government, defense, telecommunications, and transportation. This group has been active since late 2024 and has prominently exploited vulnerabilities, particularly CVE-2021-26855, to gain initial access to targeted systems. Subsequent actions involve deploying the GODZILLA web shell for persistence and conducting further activities like credential dumping and lateral movement using various tools such as Mimikatz and custom tunneling utilities.

SHADOW-EARTH-053 establishes initial access through known vulnerabilities, specifically in Microsoft Exchange servers. The exploitation results in the deployment of web shells, enabling attackers to maintain control over compromised systems. The observed filenames for these web shells, such as “error.aspx” and “signout.aspx,” indicate strategic placement within critical directories. Following this, attackers engage in credential harvesting and use tunneling technologies like IOX and Wstunnel for covert communications, allowing for lateral movement within networks.

The malware ShadowPad is critical in the attacker’s toolkit, employed through techniques such as DLL side-loading to ensure stealth and continuity of operations. In limited cases, the presence of Noodle RAT, associated with a different vulnerability (CVE-2025-55182), was noted, although its role remains uncertain. The detailed operational methods of the group illustrate a sustained capability to compromise enterprise infrastructure, reminiscent of established cyber espionage frameworks.

Defensive Context

Organizations in sectors targeted, especially in government and defense, should be particularly vigilant against this threat. The exploitation of Microsoft Exchange vulnerabilities means that entities running unsupported or outdated versions are especially at risk. The techniques employed in this campaign necessitate a forensic approach to incident response, examining web server directories and monitoring for unusual patterns of credential access and tunneling activities.

Why This Matters

The implications of this campaign are significant. Organizations exposed to these vulnerabilities may face severe breaches, resulting in data loss or unauthorized access to sensitive information. The ongoing nature of these attacks underlines a persistent threat, emphasizing the need for appropriate defenses tailored to current attacker methodologies.

Defender Considerations

Monitoring for unauthorized web shells and credential dumping activities is crucial in mitigating the risk of compromise. Continued vigilance against tunneling activity, especially involving tools like IOX, GOST, and Wstunnel, may provide early detection opportunities. Identifying and blocking known malicious IP addresses and domains associated with SHADOW-EARTH-053 will be essential for organizational defense.

Indicators of Compromise (IOCs)

  • IP Addresses:
    • 141.164.46.77
    • 96.9.125.227
    • 194.38.11.3
  • Domains:
    • time.microsofttrends.com
    • erp.kaspersky.icu
    • check.office365-update.com
  • File Hashes:
    • TosBtKbd.dll: SHA-256: e12c2682a7949661fa99bf46723a1405c658d109411de3bf6cb04c57337cc020
    • mdync.exe: SHA-256: 3f6382418d0137f6ecbef23bfd981938bb86a935b27203f5b053e3710e835f97

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles