Unraveling the Many Stages and Techniques Used by RedCurl/EarthKapre APT

In January 2025, the eSentire Threat Response Unit (TRU) identified a sophisticated cyber espionage campaign orchestrated by the EarthKapre/RedCurl Advanced Persistent Threat (APT) group. This report delves into the intricate stages and techniques employed by this highly advanced threat actor, providing a comprehensive analysis of their tactics, techniques, and procedures (TTPs).

EarthKapre, also known as RedCurl, is renowned for its sophisticated operations primarily targeting private-sector organizations with a focus on corporate espionage. The group’s latest attack targeted an organization within the Law Firms & Legal Services industry, highlighting their strategic selection of high-value targets.

The attack vector involved the use of a legitimate Adobe executable (ADNotificationManager.exe) to sideload the EarthKapre/RedCurl loader. This method demonstrates the group’s ability to leverage trusted software to bypass security measures and gain initial access to the target network. The sideloading technique is particularly insidious because it exploits the trust users have in legitimate applications, making detection and prevention more challenging.

The EarthKapre/RedCurl APT group employs a multi-stage attack process that includes several sophisticated techniques:

  1. Initial Access: The attackers gain entry into the network by exploiting vulnerabilities or using phishing campaigns to trick users into executing malicious payloads. In this case, they utilized a legitimate Adobe executable to sideload their loader.

  2. Persistence: Once inside the network, the group establishes persistence mechanisms to ensure continued access even if the initial infection is detected and removed. This often involves modifying system configurations or using legitimate tools for malicious purposes.

  3. Lateral Movement: After gaining a foothold, the attackers move laterally within the network to identify high-value targets and sensitive data. They use various techniques such as pass-the-hash, pass-the-ticket, and remote desktop protocols (RDP) to navigate through the network undetected.

  4. Data Exfiltration: The final stage involves exfiltrating the stolen data to a command-and-control server controlled by the attackers. This data is then analyzed for valuable information that can be used for corporate espionage or other malicious activities.

The EarthKapre/RedCurl APT group’s tactics highlight the need for robust cybersecurity measures. Organizations must implement comprehensive security strategies to protect against such advanced threats. Here are some recommendations:

  1. Regular Security Audits: Conduct regular security audits and vulnerability assessments to identify and mitigate potential entry points for attackers.
  2. Employee Training: Provide ongoing training to employees on recognizing phishing attempts and other social engineering tactics. Human error is often the weakest link in cybersecurity, so educating staff can significantly reduce the risk of successful attacks.

  3. Advanced Threat Detection: Deploy advanced threat detection tools that use machine learning and artificial intelligence to identify anomalous behavior indicative of an APT attack.

  4. Network Segmentation: Implement network segmentation to limit lateral movement within the network. By isolating critical systems, organizations can contain potential breaches and prevent attackers from accessing sensitive data.

  5. Incident Response Plan: Develop and regularly update an incident response plan to ensure a swift and effective response in case of a security breach. This includes having a dedicated team ready to handle incidents and minimize damage.

  6. Regular Software Updates: Ensure that all software, including legitimate applications like Adobe executables, are kept up-to-date with the latest security patches. This reduces the risk of exploitation through known vulnerabilities.

  7. Multi-Factor Authentication (MFA): Implement MFA for all critical systems and user accounts to add an extra layer of security. Even if credentials are compromised, MFA can prevent unauthorized access.

The EarthKapre/RedCurl APT group’s attack on a Law Firms & Legal Services organization underscores the importance of vigilance in cybersecurity. By understanding their TTPs and implementing robust security measures, organizations can better protect themselves against such sophisticated threats. For more detailed information, please refer to the external references provided:

https://www.esentire.com/blog/unraveling-the-many-stages-and-techniques-used-by-redcurl-earthkapre-apt
https://otx.alienvault.com/pulse/67b33e146f62a1c90b35ee00

This report provides a comprehensive overview of the EarthKapre/RedCurl APT group’s activities and offers actionable recommendations for enhancing cybersecurity defenses. By staying informed and proactive, organizations can mitigate the risks posed by advanced threat actors like EarthKapre/RedCurl.


Discover more from ESSGroup

Subscribe to get the latest posts sent to your email.


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from ESSGroup

Subscribe now to keep reading and get access to the full archive.

Continue reading