2026-04-30 | Auto-Generated 2026-04-30 | Oracle-42 Intelligence Research
```html

Operation Silent Anchor: CVE-2025-44487 Exploited in Cisco ASA Next-Gen Firewalls for DNS-over-HTTPS Exfiltration by China-Linked APT

Executive Summary: In late Q1 2025, a China-linked advanced persistent threat (APT) group—tracked as “Earth Longhorn” by Oracle-42 Intelligence—began exploiting a critical zero-day vulnerability, CVE-2025-44487, in Cisco Adaptive Security Appliance (ASA) Next-Generation Firewalls (NGFW). The flaw, a remote code execution (RCE) issue in the SSL VPN module, was weaponized to establish covert DNS-over-HTTPS (DoH) exfiltration tunnels. These tunnels enabled sustained data exfiltration from high-value targets across sectors including government, defense, and critical infrastructure. This operation, codenamed Silent Anchor, demonstrates a strategic shift toward leveraging legacy enterprise security devices as covert command-and-control (C2) and data exfiltration gateways. This report provides a technical dissection of the attack chain, IOCs, and actionable mitigation strategies.

Key Findings

Technical Analysis of CVE-2025-44487

The vulnerability resides in the sslvpn_webvpn component of Cisco ASA firmware versions 9.16 and 9.18, specifically in the handling of malformed HTTP requests during authentication. An attacker can send a crafted HTTP POST request with oversized headers or malformed session tokens, triggering a heap overflow in the SSL VPN session manager. This leads to arbitrary code execution in the context of the webvpn process (root privileges).

Notably, the flaw bypasses authentication due to incorrect state validation in the pre-authentication flow—a classic race condition between session creation and token validation. Once exploited, the shellcode injects a memory-resident dropper that persists across reboots via a hidden cron job disguised as a system update.

Operation Silent Anchor: Attack Chain

The intrusion begins with opportunistic scanning of exposed ASA appliances on port 443/TCP using the Zmap toolkit. Once a vulnerable instance is identified, the threat actor deploys an obfuscated Python script that exploits CVE-2025-44487 to write a small ELF loader into /tmp. The loader fetches the primary payload—a Golang-based implant named silentcore—via HTTPS from a compromised WordPress site using steganography (PNG headers).

silentcore performs the following:

Data is pre-compressed using Zstandard and base64-encoded within the DNS label field. The actor uses a custom domain generation algorithm (DGA) seeded with the current month and year (e.g., a12345-2025-04.lookup.cloudflare.com), making detection via static IOCs difficult.

Lateral Movement and Persistence

After establishing a foothold, Earth Longhorn conducts internal reconnaissance using nmap and masscan over the encrypted DoH channel. They move laterally via SMB relay attacks against domain controllers, harvesting credentials with Mimikatz variants compiled for ARM architecture.

Persistence is maintained through:

Detection and Threat Hunting

Given the use of DoH, traditional DNS logging is ineffective. Instead, defenders should focus on:

Mitigation and Remediation

Immediate action is required to neutralize Silent Anchor:

Attribution and Geopolitical Context

Earth Longhorn is a subgroup of APT41, known for moonlighting operations between cybercrime and state espionage. Their targeting of energy grids during the 2025 Southeast Asian energy crisis aligns with China’s strategic interest in securing Belt and Road Initiative infrastructure. The use of DoH suggests evasion of both national firewalls and corporate DLP systems, reflecting a broader trend of “living-off-trusted-cloud” tactics.

Lessons Learned and Future Risks

Silent Anchor highlights a dangerous convergence: