In recent news, a threat actor known as “TIDrone” has been identified by researchers for targeting military- and satellite-related industrial supply chains, specifically focusing on drone manufacturers in Taiwan. According to Trend Micro, TIDrone has been linked to other Chinese-speaking groups and is utilizing enterprise resource planning (ERP) software and remote desktop tools to deploy sophisticated, proprietary malware.
Since the start of 2024, there has been a rise in incident response cases originating from Taiwan related to TIDrone, as reported by Trend Micro. Interestingly, telemetry data from VirusTotal suggests that the threat actor’s scope extends beyond Taiwan to other countries, highlighting the importance of staying vigilant against this evolving threat.
TIDrone employs specialized toolsets like “CXCLNT,” which facilitates file upload and download, gathers victim information such as file directories and computer names, and includes stealth capabilities. Another tool in their arsenal is “CLNTEND,” a remote access tool (RAT) that was first observed in April and supports a wide array of network protocols for communication.
Once TIDrone successfully compromises a target, it leverages user account control (UAC) bypass techniques, credential dumping, and hacktool utilization to circumvent antivirus products, as highlighted in the analysis. The researchers pointed out that the threat actors behind TIDrone continuously update their tools and refine their attack methods. Notably, they employ anti-analysis tactics in their loaders, such as validating the entry point address from the parent process and manipulating commonly used application programming interfaces (APIs) like GetProcAddress to redirect the execution flow.
The evolving nature of the TIDrone threat underscores the importance of robust cybersecurity measures in defense against sophisticated cyber adversaries targeting critical industries. As the threat landscape continues to evolve, organizations must remain vigilant and proactive in implementing comprehensive security protocols to safeguard their networks and sensitive data from malicious actors like TIDrone.

