When Trusted Sites Turn Malicious: How APT24’s ‘BadAudio’ Is Redefining Cyber Espionage

In a deeply concerning cyber-espionage campaign, a China-linked threat actor known as APT24 has been deploying a previously unknown malware called BadAudio by compromising real, legitimate public websites. The implications for enterprises everywhere are serious and highlight how attackers are constantly innovating their tactics. Here’s a breakdown of what’s happening, why it matters, and how organizations can defend themselves.

The Threat Unveiled

According to Google Threat Intelligence Group (GTIG), APT24 has run this operation over nearly three years, evolving from old-school watering-hole attacks to far more sophisticated, multi-vector strategies.

Here’s a look at their playbook:

  1. Strategic Website Compromise
    Since November 2022, APT24 has quietly injected malicious JavaScript into more than 20 legitimate public websites. These sites appear innocent but on the back end, they selectively fingerprint visitors (especially Windows users), decide who is interesting, and then trigger a fake pop-up mimicking a Google Chrome update to trick users into downloading BadAudio.
  2. Supply-Chain Attack via Marketing Firm
    In mid-2024, the group compromised a regional digital marketing firm in Taiwan that provides widely used JavaScript libraries. By injecting malicious code into one of their libraries and even registering a lookalike domain mimicking a CDN APT24 extended its reach to over 1,000 domains, all unknowingly serving its malware loader.
  3. Sophisticated Malware Delivery
    BadAudio is not a simple dropper it’s a custom C++ downloader. It fetches an AES-encrypted payload from a command-and-control server, decrypts it in memory, and executes it. It’s delivered as a DLL, using search-order hijacking to sideload itself via legitimate-looking applications. Later versions of BadAudio have been distributed in archives containing VBS, BAT, and LNK scripts which help the malware install itself, maintain persistence, and sideload the dangerous DLL.
Follow-up Tools & Social Engineering

In some cases, BadAudio leads to a Cobalt Strike beacon, enabling remote control over infected systems. APT24 has also used spear-phishing emails disguised as outreach from animal rescue organizations and hosted malicious archives in trusted cloud services like Google Drive and Microsoft OneDrive.

Why This Matters
  • Persistent Espionage: This is not a one-off hack APT24 has been operating for years, adjusting tactics and refining their tools.
  • Multi-layered Attack: By combining watering-hole, supply-chain, and phishing attacks, they increase their chances of success without relying on any single method.
  • High-Trust Abuse: Using legitimate domains and trusted libraries makes detection much harder. The very sites and code that users and companies trust become the vector for compromise.
  • Targeted Footprint: The focus on Windows users and selective visitor fingerprinting shows careful planning rather than mass indiscriminate attack.
How to Defend Against This Threat

Organizations can’t just rely on standard antivirus or generic threat detection. Here are key defensive strategies:

  • Continuous Threat Intelligence: Stay updated on APT24’s tactics via threat feeds and intelligence services.
  • Supply Chain Vetting: Carefully assess third-party vendors, especially those providing JavaScript libraries or CDN services.
  • Application Whitelisting: Restrict which executables and DLLs can run validate digital signatures.
  • Behavioral Monitoring: Monitor for unusual process behavior, DLL sideloading, or memory-only execution.
  • User Awareness Training: Educate employees about targeted phishing, even when the email seems harmless (like a non-profit appeal).
  • Incident Response Planning: Have a response and recovery plan ready in case of compromise and test it.
Conclusion

The emergence of BadAudio shows how cyber-espionage groups continue to evolve. APT24’s use of legitimate websites, supply-chain vulnerabilities, and complex malware underscores the need for layered and proactive defense. This campaign is a warning: trust alone is not enough.

About COE Security

At COE Security, we specialize in helping organizations strengthen their cyber defenses and maintain regulatory compliance. Whether you operate in financehealthcareindustrial manufacturingcloud-based services, or governed public sector infrastructure, we provide tailored security and compliance solutions.

Our services include:

  • Compliance as a Service (CaaS), helping you stay aligned with frameworks like GDPRHIPAASOC 2PCI DSS, and ISO 27001.
  • Cybersecurity assessments, auditing, and control implementation.
  • Continuous monitoring, incident response, and threat intelligence integration.

By partnering with COE Security, you get expert guidance, scalable tools, and ongoing support freeing you to focus on your core business while we manage your security posture.

Stay Cyber Safe
Follow COE Security on LinkedIn for regular updates, threat insights, and compliance guidance. So you can stay informed and protected.

Click to read our LinkedIn feature article