FamousSparrow Returns with Two New Versions of Their Signature SparrowDoor Backdoor

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

FamousSparrow, a China-linked advanced persistent threat (APT) group previously thought to be inactive since 2022, is back in business with two previously undocumented versions of the group's signature backdoor, SparrowDoor.

The hallmark of this campaign was the discovery of two advanced versions of SparrowDoor by ESET researchers These versions represent considerable improvements in code quality, architecture, and functionality.

While FamousSparrow’s activities overlapped with groups like Salt Typhoon and Earth Estries, ESET researchers maintain that FamousSparrow remains distinct. 

Overview of the compromise chain in this FamousSparrow campaign
Overview of the compromise chain in this FamousSparrow campaign | Source: ESET

One version shares design similarities with CrowDoor, a backdoor linked with Earth Estries, another APT group, and acts as a TCP proxy between the command and control (C2) server and an arbitrary machine.

The other, a modular variant, only implements the commands related to C2 configuration management and uninstalling the backdoor, adding a list of installed security products when exfiltrating host details.

For the first time, FamousSparrow was also observed utilizing ShadowPad, a backdoor exclusively available to Chinese-aligned threat actors like APT41. This marked a significant collaboration in methodologies among nation-state-backed cyber threat groups.

Overlaps, such as shared infrastructure and similar tactics, may suggest coordination via a central "digital quartermaster" rather than direct links between the groups.

FamousSparrow continues to rely on a blend of custom tools and shared malware. Key methods observed include:

The renewed activity was discovered in July 2024 when ESET responded to a cybersecurity incident affecting a trade group in the U.S. financial sector. Further investigation revealed that FamousSparrow had also breached a research institute in Mexico during the same campaign.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: