Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.

A sophisticated cyber-espionage campaign, attributed to the China-based advanced persistent threat (APT) group TA423, also known as Red Ladon, has been actively distributing the potent ScanBox reconnaissance framework. The campaign, which operated from April to mid-June 2022, primarily targeted domestic Australian organizations and critical offshore energy firms operating in the strategically vital South China Sea. This concerted effort leveraged highly convincing watering hole attacks, employing deceptive phishing messages that purported to link to legitimate Australian news websites, drawing victims into a meticulously crafted trap.
The findings, detailed in a comprehensive report released by Proofpoint’s Threat Research Team and PwC’s Threat Intelligence team, shed light on the persistent and evolving tactics of state-sponsored actors. The report, published on a Tuesday in the period following the observation of the attacks, underscored the significant threat posed by groups like TA423 to national security and economic interests in the Indo-Pacific region and beyond.
Unmasking the Threat Actor: TA423 / Red Ladon
TA423, also referred to as Red Ladon, is a prominent China-based APT group with a well-documented history of cyber espionage activities. Researchers, including those at Proofpoint, assess with moderate confidence that this group operates out of Hainan Island, China. This attribution aligns with multiple previous reports from leading cybersecurity firms like Mandiant and public alerts from agencies such as the U.S. Cybersecurity and Infrastructure Security Agency (CISA), which have consistently linked TA423 to Chinese state-sponsored operations.
The group’s operational scope and strategic objectives are closely tied to the People’s Republic of China’s intelligence apparatus. A significant 2021 indictment by the U.S. Department of Justice explicitly accused TA423 / Red Ladon of providing long-running support to the Hainan Province Ministry of State Security (MSS). The MSS is China’s civilian intelligence, security, and cyber police agency, holding broad responsibilities for counter-intelligence, foreign intelligence gathering, political security, and is widely believed to be a central player in China’s industrial and cyber espionage efforts globally. This direct linkage to the MSS underscores the state-backed nature of TA423’s operations and the strategic importance of their intelligence collection mandates.
Historically, TA423 has not confined its activities to a single geographical area or industry. The July 2021 Department of Justice indictment further detailed the group’s extensive reach, accusing them of having "stolen trade secrets and confidential business information" from victims across a staggering array of countries including the United States, Austria, Cambodia, Canada, Germany, Indonesia, Malaysia, Norway, Saudi Arabia, South Africa, Switzerland, and the United Kingdom. Targeted industries have been equally diverse, encompassing aviation, defense, education, government, healthcare, biopharmaceutical, and maritime sectors. This broad targeting profile highlights TA423’s role in supporting China’s strategic interests, including economic development through intellectual property theft and geopolitical intelligence gathering. Despite the public indictment and the associated exposure, cybersecurity analysts have observed no distinct disruption in TA423’s operational tempo, collectively expecting the group to continue its intelligence-gathering and espionage missions unabated.
The Campaign’s Modus Operandi: Phishing and Watering Holes
The recent campaign, observed between April and mid-June 2022, commenced with carefully crafted phishing emails designed to entice targets into clicking malicious links. These emails often featured innocuous-sounding subject lines such as “Sick Leave,” “User Research,” and “Request Cooperation.” To enhance their credibility, many of these emails purported to originate from an employee of a fictitious entity called the “Australian Morning News,” urging recipients to visit their “humble news website,” hosted at australianmorningnews[.]com.
Upon clicking the deceptive link, victims were redirected to the compromised website, which served as the watering hole. These sites were meticulously designed to mimic legitimate news portals, often copying content directly from well-known news sources like the BBC and Sky News. This tactic aimed to instill a false sense of security, making the victim believe they were browsing a genuine news outlet. However, in the background, the malicious JavaScript-based ScanBox framework was silently delivered and executed within the victim’s web browser.
Watering hole attacks are a particularly insidious form of cyberattack. Instead of directly targeting an individual, attackers compromise a website that a specific group of targets is known to frequent. By doing so, they wait for their prey to "drink from the watering hole." This method is highly effective for targeted reconnaissance, as it allows adversaries to gather intelligence on potential victims without requiring direct interaction or the deployment of traditional malware onto a system. The perceived legitimacy of the compromised website makes it easier for the attackers to evade initial suspicion, leading to a higher success rate for reconnaissance efforts.
ScanBox: The Covert Reconnaissance Framework
At the heart of TA423’s recent campaign is the ScanBox framework, a customizable and multifunctional JavaScript-based tool notorious for its ability to conduct covert reconnaissance. ScanBox has been a staple in adversaries’ toolkits for nearly a decade, distinguishing itself by its capacity to gather extensive intelligence without needing to deploy persistent malware onto a target’s system. This "malware-less" approach makes detection more challenging for traditional endpoint security solutions.
As PwC researchers highlighted in reference to previous campaigns, "ScanBox is particularly dangerous as it doesn’t require malware to be successfully deployed to disk in order to steal information – the keylogging functionality simply requires the JavaScript code to be executed by a web browser." This means that simply visiting the compromised watering hole website is sufficient for ScanBox to begin its data collection, making it a highly effective initial reconnaissance tool.
Once executed, the ScanBox framework operates as a sophisticated keylogger, capturing all user-typed activity on the infected watering hole website. This harvested keylogger data is a crucial component of a multi-stage attack strategy, providing attackers with invaluable insights into potential targets. This initial intelligence, often referred to as browser fingerprinting, helps the adversaries refine their understanding of the victim environment and plan more targeted, impactful future attacks.
The primary script of ScanBox meticulously sources a wealth of information about the target computer. This includes details about the operating system, language settings, and the version of Adobe Flash installed. Beyond these basic parameters, ScanBox performs advanced checks for browser extensions, plugins, and critical web components such as WebRTC.
Deep Dive into ScanBox’s Technical Prowess: WebRTC, STUN, and ICE
ScanBox’s advanced capabilities extend to leveraging modern web technologies for enhanced reconnaissance and communication. The framework implements WebRTC (Web Real-Time Communication), a free and open-source technology supported across all major browsers, enabling real-time communication (RTC) over application programming interfaces (APIs). Researchers explain that this allows ScanBox to establish connections to a set of pre-configured targets, facilitating data exfiltration and control.
Crucially, adversaries can then exploit technologies like STUN (Session Traversal Utilities for NAT) and ICE (Interactive Connectivity Establishment). STUN is a standardized set of methods, including a network protocol, designed to allow interactive communications—such as real-time voice, video, and messaging applications—to traverse network address translator (NAT) gateways. NATs are commonly used in corporate and home networks to allow multiple devices to share a single public IP address, often posing a challenge for direct peer-to-peer communication.
STUN is natively supported by the WebRTC protocol. Through the use of third-party STUN servers located on the internet, ScanBox can enable victim hosts to discover the presence of a NAT and ascertain the mapped IP address and port number that the NAT has allocated for the application’s User Datagram Protocol (UDP) flows to remote hosts. This is a critical step in enabling communication with machines that are behind network firewalls or NAT devices, which would otherwise block direct connections.
Furthermore, ScanBox implements NAT traversal using STUN servers as part of Interactive Connectivity Establishment (ICE). ICE is a peer-to-peer communication method designed to allow clients to communicate as directly as possible, bypassing the complexities of communicating through NATs, firewalls, or other network solutions. As researchers detailed, "This means that the ScanBox module can set up ICE communications to STUN servers, and communicate with victim machines even if they are behind NAT." This technical sophistication ensures that ScanBox can effectively collect and exfiltrate data from a wide range of victim network environments, significantly expanding its reach and effectiveness as a reconnaissance tool.
Geopolitical Context and Strategic Targets
The targeting of domestic Australian organizations and offshore energy firms in the South China Sea by TA423 carries significant geopolitical implications. Sherrod DeGrippo, vice president of threat research and detection at Proofpoint, emphasized the strategic focus of the threat actors: “The threat actors support the Chinese government in matters related to the South China Sea, including during the recent tensions in Taiwan. This group specifically wants to know who is active in the region and, while we can’t say for certain, their focus on naval issues is likely to remain a constant priority in places like Malaysia, Singapore, Taiwan, and Australia.”
The South China Sea is one of the most contentious and strategically vital waterways in the world. It is a critical global shipping lane, through which an estimated one-third of global maritime trade passes annually. The region is also believed to hold vast untapped reserves of oil and natural gas, making control and access to these resources a major point of contention among claimant states, including China, Vietnam, the Philippines, Malaysia, Brunei, and Taiwan. China’s expansive claims, often demarcated by its "nine-dash line," are not recognized by international law and have led to increased militarization and frequent confrontations in the area.
Targeting offshore energy firms in this region is a clear indication of TA423’s intelligence gathering objectives related to energy security, resource exploitation, and broader maritime domain awareness. Information gleaned from these firms could provide China with insights into rival nations’ energy infrastructure, exploration activities, and operational vulnerabilities, thereby strengthening its strategic position in the South China Sea. Similarly, targeting Australian organizations, particularly those with connections to the maritime sector, defense, or critical infrastructure, aligns with China’s broader intelligence objectives concerning regional influence and counter-intelligence against perceived adversaries or competitors. Australia, a key U.S. ally and a significant player in regional security through alliances like AUKUS and the Quad, represents a high-value intelligence target for state-sponsored actors seeking to understand geopolitical alignments and capabilities.
Broader Impact and Implications
The persistent activity of APT TA423, even in the face of public indictments, underscores a fundamental challenge in combating state-sponsored cyber espionage. The lack of a "distinct disruption of operational tempo" post-indictment suggests that such legal actions, while important for attribution and signaling, do not always deter nation-state actors who operate with state backing and are largely immune to traditional law enforcement pressures. This reality necessitates a multi-faceted approach to cybersecurity, combining robust defensive measures with proactive threat intelligence sharing and international cooperation.
The use of sophisticated reconnaissance tools like ScanBox highlights the evolving nature of cyber threats. By relying on JavaScript execution within a browser rather than traditional malware deployment, threat actors can conduct extensive intelligence gathering with a lower risk of detection. This "low-and-slow" approach allows them to identify high-value targets for subsequent, more potent attacks, making initial reconnaissance a critical phase in the cyber kill chain. Organizations, particularly those operating in geopolitically sensitive sectors or regions, must assume they are potential targets for such sophisticated campaigns.
To mitigate the risks posed by groups like TA423, organizations must adopt a proactive and layered cybersecurity strategy. This includes comprehensive employee training on phishing awareness, emphasizing caution with suspicious links and unexpected emails, even if they appear to originate from credible sources. Technical defenses must be robust, incorporating advanced endpoint detection and response (EDR) solutions, network intrusion detection systems, and up-to-date web browser security configurations. Regular security audits, penetration testing, and subscribing to high-quality threat intelligence feeds are also crucial for staying abreast of evolving tactics and indicators of compromise. Furthermore, international collaboration among cybersecurity agencies and private sector firms is essential to share intelligence, track threat actors, and develop collective defenses against the pervasive and persistent threat of state-sponsored cyber espionage.







