UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities

Arctic Wolf Labs has identified an active cyber espionage campaign by Chinese-affiliated threat actor UNC6384 targeting European diplomatic entities in Hungary, Belgium, and additional European nations during September and October 2025.
6 min read

Threat Actor Name: UNC6384
Targeted Industries: Government, Diplomatic Services
Geographic Focus: Hungary, Belgium, Serbia, Italy, Netherlands (broader European diplomatic community)

Executive Summary

Arctic Wolf Labs has identified an active cyber espionage campaign by Chinese-affiliated threat actor UNC6384 targeting European diplomatic entities in Hungary, Belgium, and additional European nations during September and October 2025. The campaign represents a tactical evolution incorporating the exploitation of ZDI-CAN-25373, a Windows shortcut vulnerability disclosed in March 2025, alongside refined social engineering leveraging authentic diplomatic conference themes.

The attack chain begins with spearphishing emails containing an embedded URL that is the first of several stages that lead to the delivery of malicious LNK files themed around European Commission meetings, NATO-related workshops, and multilateral diplomatic coordination events. These files exploit the recently disclosed Windows vulnerability to execute obfuscated PowerShell commands that extract and deploy a multi-stage malware chain, culminating in PlugX remote access trojan (RAT) deployment through DLL side-loading of legitimate signed Canon printer assistant utilities.

This campaign demonstrates UNC6384’s capability for rapid vulnerability adoption within six months of public disclosure, advanced social engineering leveraging detailed knowledge of diplomatic calendars and event themes, and operational expansion from traditional Southeast Asia targeting to European diplomatic entities. The threat actor maintains multiple parallel operational approaches, including the captive portal hijacking methodology documented by the Google Threat Intelligence Group alongside the direct spearphishing approach observed by Arctic Wolf Labs.

Arctic Wolf Labs assesses with high confidence that this campaign is attributable to UNC6384. This attribution is based on multiple converging lines of evidence including malware tooling, tactical procedures, targeting alignment, and infrastructure overlaps with previously documented UNC6384 operations.

Key Findings:

  • UNC6384 rapidly adopted the ZDI-CAN-25373 Windows vulnerability within six months of its March 2025 disclosure.
  • This campaign targets Hungarian and Belgian diplomatic entities, with expansion across the broader European diplomatic community.
  • Social engineering leverages diplomatic conference details including European Commission border facilitation meetings and NATO defense procurement workshops.
  • The multi-stage attack chain employs DLL side-loading of legitimate signed Canon printer utilities.
  • PlugX malware deployed via in-memory execution establishes a persistent remote-access capability within targeted environments, enabling covert intelligence collection.
  • C2 infrastructure includes racineupci[.]org, dorareco[.]net, naturadeco[.]net, and additional domains.
  • The CanonStager loader evolved from approximately 700KB to 4KB in size between September and October 2025, indicating active development.

Introducing UNC6384

UNC6384 is a Chinese-affiliated cyber espionage threat actor recently documented by Google’s Threat Intelligence Group. The group has demonstrated a persistent focus on diplomatic entities, having previously targeted diplomats in the Southeast Asia region before expanding operations to European diplomatic targets. UNC6384 employs multi-faceted execution chains that combine social engineering, traffic manipulation techniques, digitally signed downloaders, and memory-resident malware deployment to achieve operational objectives.

The threat actor specializes in deploying variants of PlugX malware, which Google tracks as SOGU.SEC. PlugX has been actively used since at least 2008 and remains a favored tool among Chinese-nexus threat actors due to its modular architecture, extensive remote access capabilities, and evolving evasion techniques.

UNC6384 is believed to have associations with the well-established People’s Republic of China (PRC) threat actor Mustang Panda, also tracked as TEMP.Hex. Both groups share multiple operational characteristics including targeting profiles focused on government sectors, overlapping command and control (C2) infrastructure, deployment of PlugX malware variants, and utilization of DLL side-loading techniques for payload execution. Google’s attribution assessment is based on similarities in tooling, tactics, procedures, practices, targeting alignment with PRC’s strategic interests, and infrastructure overlaps between the two groups.

Campaign Overview and Attack Methodology

Arctic Wolf Labs identified a new campaign by UNC6384 specifically targeting Hungarian and Belgian diplomatic entities during September and October 2025. This campaign represents a tactical evolution from the group’s previously documented operations, introducing exploitation of a recently disclosed Windows vulnerability alongside refined social engineering approaches.

The attack begins with targeted spearphishing emails that kick off several stages that lead to the delivery of malicious LNK files, themed around diplomatic meetings and conferences. These files leverage ZDI-CAN-25373, a Windows shortcut vulnerability disclosed in March 2025, that enables covert command execution through whitespace padding within the LNK file’s COMMAND_LINE_ARGUMENTS structure.

Research from Trend Micro identified this vulnerability being exploited as a zero-day by multiple advanced persistent threat (APT) groups from North Korea, China, Russia, and Iran, for the purposes of espionage and data theft. UNC6384’s adoption of this technique demonstrates the group’s capability to rapidly integrate newly disclosed vulnerabilities into operational tradecraft.

The malicious LNK files use diplomatic conference themes as lures, including Agenda_Meeting 26 Sep Brussels.lnk, which references a European Commission meeting on facilitating the free movement of goods at EU-Western Balkans border crossing points. Upon execution, the LNK file invokes PowerShell to decode and extract a tar (tape archive) archive file, which is then decompressed to deploy multiple components, including a legitimate signed Canon printer assistant utility, a malicious DLL, and an encrypted payload file.

This campaign differs from UNC6384’s operations previously documented by Google Threat Intelligence Group, which employed adversary-in-the-middle attacks through captive portal hijacking to deliver malware disguised as Adobe plugin updates. Our findings indicate that UNC6384 maintains multiple parallel operational approaches adapted to specific target environments and access opportunities.

Technical Analysis

Stage 1: Initial Access via Malicious LNK File

The attack chain initiates with a weaponized LNK file, delivered to targets through spearphishing operations. The LNK file exploits ZDI-CAN-25373, a Windows shortcut vulnerability that allows the threat actor to execute commands covertly by adding whitespace padding within the COMMAND_LINE_ARGUMENTS structure.

Field Value
Name Agenda_Meeting 26 Sep Brussels.lnk
SHA-256 911cccd238fbfdb4babafc8d2582e80dcfa76469fa1ee27bbc5f4324d5fca539
File Type .lnk file
Size 2.58KB

 

Upon execution, the LNK file invokes PowerShell with an obfuscated command that decodes a tar archive file named rjnlzlkfe.ta, which it saves it to the AppData\Local\Temp directory. The PowerShell command then extracts the tar archive using tar.exe -xvf and initiates execution of the contained cnmpaui.exe file. Simultaneously, a PDF decoy document is displayed, showing the authentic agenda for a European Commission meeting that was scheduled for September 26, 2025, in Brussels. This maintains the illusion of legitimate document access while malicious actions occur in the background.

Figure 1: Decoy PDF document displaying European Commission meeting agenda on facilitating the free movement of goods at EU-Western Balkans border crossing points.

Stage 2: DLL Side-Loading via Legitimate Signed Binary

The extracted tar archive contains three critical files that enable the attack chain through DLL side-loading, a technique that abuses the Windows DLL search order to load malicious code through legitimate applications. 

Figure 2: Contents of extracted tar archive showing three files: cnmpaui.dll (4KB), cnmpaui.exe (352KB), and cnmplog.dat (818KB).

The primary executable is a legitimate Canon printer assistant utility that possesses a valid digital signature from Canon Inc., signed with a certificate issued by Symantec Class 3 SHA256 Code Signing CA. Although the certificate expired on April 19, 2018, Windows continues to trust binaries whose signatures include a valid timestamp proving they were signed while the certificate was valid.

Field Value
Name cnmpaui.exe
SHA-256 4ed76fa68ef9e1a7705a849d47b3d9dcdf969e332bd5bcb68138579c288a16d3
File Type PE32 executable
Size 352.67KB
Certificate Issuer Symantec Class 3 SHA256 Code Signing CA
Certificate Valid From July 9, 2015
Certificate Valid Until April 19, 2018 (expired)

 

Figure 3: Digital certificate information showing a valid Canon Inc. signature issued by Symantec, with a validity period from 2015 to 2018.

This legitimate binary is susceptible to DLL side-loading attacks. When cnmpaui.exe executes, it searches for cnmpaui.dll in its current directory before checking system directories. The threat actor exploits this behavior by planting a malicious cnmpaui.dll in the same directory.

Field Value
Name cnmpaui.dll
SHA-256 e53bc08e60af1a1672a18b242f714486ead62164dda66f32c64ddc11ffe3f0df
File Type PE32 DLL
Size 4.00KB

 

The malicious DLL functions as a lightweight loader designed to decrypt and execute the third file in the archive, cnmplog.dat, which contains the encrypted PlugX payload.

Stage 3: Encrypted Payload Decryption and In-Memory Execution

The cnmplog.dat file is an RC4-encrypted blob containing the PlugX malware. The malicious DLL decrypts this file using a hardcoded 16-byte RC4 key and loads the resulting PlugX payload directly into the address space of the legitimate cnmpaui.exe process, enabling the malware to execute within a trusted process context and evade detection mechanisms that rely on process reputation or executable file analysis.

Field Value
Name cnmplog.dat
SHA-256 c9128d72de407eede1dd741772b5edfd437e006a161eecfffdf27b2483b33fc7
File Type Encrypted blob
Size 817.09KB
Encryption RC4 with 16-byte hardcoded key
RC4 Key eQkiwoiuDsvIPsmd

 

Figure 4: Hexadecimal view of cnmplog.dat showing encrypted content before decryption.

This three-stage execution flow completes the deployment of PlugX malware running stealthily within a legitimate signed process, significantly reducing the likelihood of detection by endpoint security solutions.

Figure 5: Graph overview showing the high-level execution chain.

PlugX Malware Analysis

PlugX is a Remote Access Trojan (RAT) that was first observed in 2008. It has seen many evolutions and variations since then, including as a modular malware, and it is a threat that remains actively deployed by Chinese-affiliated threat actors.

The malware provides comprehensive remote access capabilities including command execution, keylogging, file upload and download operations, persistence establishment, and extensive system reconnaissance functions. Its modular architecture allows operators to extend functionality through plugin modules tailored to specific operational requirements.

PlugX operates under multiple aliases including Korplug, TIGERPLUG, and SOGU. The Google Threat Intelligence Group tracks the memory-resident variant deployed by UNC6384 as SOGU.SEC.

Analyzed Sample Details:

  • SHA-256: 3fe6443d464f170f13d7f484f37ca4bcae120d1007d13ed491f15427d9a7121f
  • MD5: dc1dba02ab1020e561166aee3ee8f5fb
  • Compilation Timestamp: Friday, September 5, 2025, 05:15:45 UTC
  • File Type: x86 PE DLL

Loading Phase Technical Details:

All PlugX variants observed in this campaign export the MSGInitialize function. The PE header of the decrypted DLL contains shellcode that invokes this export at a specific offset. Analysis reveals the exported MSGInitialize implements control-flow flattening by using a central dispatcher loop controlled by a state variable, a technique associated with commercial obfuscators designed to complicate reverse engineering efforts.

Figure 6: Graph overview showing control-flow flattening obfuscation pattern with a state machine dispatcher creating complex execution paths.

Beneath the obfuscation layer, MSGInitialize walks the Process Environment Block (PEB) and Loader Data Table to enumerate loaded modules. The routine computes a rolling 32-bit hash using a bitwise rotate-left by 0x13 (19) bits on each iteration (functionally equivalent to a ROR-13) and compares the resulting values against embedded constants to identify specific modules. Notable hash values include 0x6A4ABC5B corresponding to KERNEL32.DLL and 0x3CFA685D corresponding to NTDLL.DLL.

Once target modules are identified, the same hashing algorithm is applied to export names within those modules, comparing hashes to additional embedded constants to locate specific APIs required for loading and mapping portable executable (PE) files into memory.

Hash Value API Function Module
0x8C394D89 NtProtectVirtualMemory ntdll.dll
0xD33BCABD NtAllocateVirtualMemory ntdll.dll
0x91AFCA54 VirtualAlloc kernel32.dll
0x7946C61B VirtualProtect kernel32.dll
0x7C0DFCAA GetProcAddress kernel32.dll
0xEC0E4E8E LoadLibraryA kernel32.dll
0xE54CC407 LdrGetProcedureAddress ntdll.dll
0xEB6C8389 RtlAnsiStringToUnicodeString ntdll.dll
0x7CC3283D RtlInitAnsiString ntdll.dll
0x534C0AB8 NtFlushInstructionCache ntdll.dll
0xB0988FE4 LdrLoadDll ntdll.dll

 

Following API resolution, the code uses Reflective Code Loading to map the PE into memory and finalizes memory protections. The module’s entry point is invoked twice in succession: first with the fdwReason parameter set to 1 corresponding to DLL_PROCESS_ATTACH for normal initialization, then immediately with a non-standard fdwReason value of 0x04, which the module recognizes as a signal to execute its payload. This loading methodology is consistent with techniques previously documented by ESET in their most recent PlugX analysis.

Figure 7: Disassembly code showing manual PE loading sequence with NtFlushInstructionCache call and DLL entry point invocation.

Anti-Analysis and Evasion Techniques:

The malware implements extensive anti-analysis measures, including heavy code obfuscation, multiple anti-debugging checks (e.g., CheckRemoteDebuggerPresent), and numerous encrypted strings that are only decrypted at runtime. The code demonstrates heavy obfuscation to prevent analysis, with control-flow flattening implemented by using a central dispatcher loop controlled by a state variable, patterns commonly associated with commercial obfuscators.

The payload also dynamically loads several system DLLs – user32.dll, shlwapi.dll, psapi.dll, version.dll, msvcrt.dll, winhttp.dll, and ole32.dll and resolves their APIs at runtime, with some API names derived from decrypted strings. These modules supply the Windows APIs the malware uses during execution.

Persistence Establishment:

The malware creates a hidden directory in one of several possible locations within the user profile and copies all extracted files to maintain persistent access. Directory names vary between infections and may include “SamsungDriver,” “Intelnet,” “VirtualFile,” “SecurityScan,” or “DellSetupFiles.” The malware establishes persistence through registry modification, creating a value named “CanonPrinter” in the registry key `Software\Microsoft\Windows\CurrentVersion\Run` with the path set to the copied cnmpaui.exe location.

Figure 8: Windows Registry Editor showing persistence mechanism via Run key entry pointing to cnmpaui.exe in SamsungDriver directory

Each time the system launches, the directory name may change and all files are transferred to the new location, complicating forensic analysis and detection based on static file paths.

Command and Control Communication:

Upon successful deployment, the malware establishes communication with C2 infrastructure using WinHTTP APIs. The payload employs a consistent user agent string across samples: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 10.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729).

Figure 9: Debugger output showing WinHttp.WinHttpConnect call preparing connection to the threat actor’s C2 server, dorareco[.]net.

Initial check-in requests incorporate epoch timestamps and randomized URL parameters that likely contain victim fingerprinting data. Observed request patterns include:

  • /download?t=1760103992&LeQa=PKDugp&VE=ZY6tyOYZWNxK2a
  • /settings?t=1760106491&D=XAl0cJ&WB=qKVsKW7KF&xRcH=dQ3SFEgr0v&78=dAi0sahua

Figure 10: Debugger output showing WinHttpOpenRequest with epoch timestamp and encoded parameters for initial C2 communication.

The parameter following the forward slash is randomly selected across requests (observed endpoints include /download, /settings, /profile, /bookmark, /help/? and /developer), suggesting dynamic request generation to complicate network-based detection. Analysis indicates the epoch timestamp provides temporal context while additional parameters likely convey system fingerprinting information, though complete parameter decoding was not achieved within the analysis timeframe.

PlugX Configuration Extraction:

Analysis of the encrypted payload reveals embedded configuration data containing operational parameters:

Sample 1 Configuration (Brussels-themed lure):

{
  "mutex": "uUbAmgDu",
  "lure_filename": "Agenda_Meeting 26 Sep Brussels_Facilitating the Free Movement of Goods at EU-WB BCPs.pdf",
  "c2": [
    {"host": "racineupci[.]org", "port": 443, "flags": "0x0001"},
    {"host": "racineupci[.]org", "port": 443, "flags": "0x0001"},
    {"host": "racineupci[.]org", "port": 443, "flags": "0x0001"}
  ]
}

Sample 2 Configuration (Copenhagen-themed lure):

{
  "mutex": "esUdgquBv",
  "lure_filename": "EPC invitation letter Copenhagen 1-2 October 2025.pdf",
  "c2": [
    {"host": "dorareco[.]net", "port": 443, "flags": "0x0001"},
    {"host": "dorareco[.]net", "port": 443, "flags": "0x0001"},
    {"host": "dorareco[.]net", "port": 443, "flags": "0x0001"}
  ]
}

Figure 11: Memory dump showing embedded PlugX configuration with the C2 domain dorareco[.]net visible in plaintext.

The configuration specifies unique mutex names for each sample variant, references to the decoy PDF lures used in social engineering ploys, and C2 infrastructure utilizing HTTPS over port 443 for encrypted communications.

CanonStager Evolution Analysis

Arctic Wolf Labs observed significant evolution in the CanonStager loader component between early September and October 2025, indicating active development and refinement of the malware delivery mechanism.

Early September Evolution

Two CanonStager samples showed substantial size reduction from approximately 700KB to approximately 100KB. These samples retained the Thread Local Storage array data structure for storing function addresses resolved through custom API hashing algorithms. However, the samples demonstrated simplified execution flow with removal of the custom Windows procedure and message queue functionality, reducing code complexity while maintaining core loader capabilities.

Early October Evolution

Three CanonStager samples measuring approximately 4KB represent a dramatic simplification of the loader architecture. This version eliminates previous complexity, including the TLS array for resolved API addresses, custom Windows procedures, message queues, and threading mechanisms. The streamlined loader walks the Process Environment Block to locate required modules, employs API hashing to resolve function addresses, stores these addresses in standard variables rather than TLS storage, performs RC4 decryption of the payload, and invokes execution via an EnumSystemGeoID callback function.

The evolution from complex loaders to minimal, streamlined variants suggests operational adaptation based on detection challenges or performance requirements. The latest 4KB version maintains essential functionality while dramatically reducing forensic footprint and analysis surface area.

An important technical distinction: the original Google Threat Intelligence Group sample was implemented in the D programming language and compiled with DMD compiler. In contrast, all three of the latest 4KB Arctic Wolf samples utilize C runtime libraries and employ general-purpose registers rather than XMM registers, indicating different development approaches or separate development teams within the UNC6384 operational structure.

Alternative Delivery Mechanisms

Also observed in early September, Arctic Wolf identified UNC6384’s use of an HTA file configured to run invisibly in the background, which loads external JavaScript from a CloudFront URL. The JavaScript facilitated payload retrieval from the same CloudFront-based C2 and served as a delivery mechanism for three critical files: cnmpaui.exe, cnmpauix.exe, and cnmplog.dat.

Field Value
Name XgPK9CpZENdh.js
SHA-256 c3b7abcb583b90559af973dd18bf5ccba48d3323e5e2e8bc0b11ff54425e34dd
File Type JavaScript
Size 4.86KB
In-The-Wild URL http[:]//d32tpl7xt7175h[.]cloudfront[.]net/XgPK9CpZENdh
Execution Parent 7a49310a9192cab1aa05256b6ca0d0c1a54fe084b103ff4df2d17be9effa3300 (No.4638.hta)
Delivered Payload a7d12712673a4e3b6d62a9d84f124e62689da12f0a3ee6009369ecf469ce8182 (cnmplog.dat)

ee9295fa36e29808ff36beb55be328b68d82f267d2faa54db26e0bf86b78fa56 (cnmpaui.dll)

4ed76fa68ef9e1a7705a849d47b3d9dcdf969e332bd5bcb68138579c288a16d3 (cnmpaui.exe)

PlugX C2 Vnptgroup[.]it[.]com

 

Field Value
Name oxF3dIMDi339.js
SHA-256 274adf7f60e0799b157e7524d503d345f6870010703fb6b56a3dd1e62b4de3e8
File Type JavaScript
Size 4.88KB
Delivered Payload 716637a424bce58ff8c75e40b6e29c33318ff185af6e9e62d85b61e56a560eac (cnmpaui.dll)

4ed76fa68ef9e1a7705a849d47b3d9dcdf969e332bd5bcb68138579c288a16d3 (cnmpaui.exe)

PlugX C2 Vnptgroup[.]it[.]com

 

Network Infrastructure Analysis

UNC6384 maintains distributed C2 infrastructure utilizing multiple domains registered through various providers and geographic regions. The infrastructure demonstrates operational security awareness through domain selection that mimics legitimate organizational naming patterns, while maintaining geographic diversity to complicate takedown efforts.

Command and Control Infrastructure:

The campaign employs the following C2 domains, all configured to communicate over HTTPS port 443:

Primary Campaign Infrastructure:

  • Racineupci[.]org (Hungarian/Belgian targeting)
  • Dorareco[.]net (Hungarian/Belgian targeting)

Overlapping Campaign Infrastructure (identified through pivoting):

  • naturadeco[.]net (Serbian government targeting)
  • cseconline[.]org (Belgian targeting)
  • vnptgroup[.]it.com (Italian targeting)
  • paquimetro[.]net (earlier campaign infrastructure)

Figure 12: Network infrastructure visualization showing relationships between C2 domains, malware samples, decoy documents, and targeted entities across multiple European nations (Click to enlarge).

Infrastructure analysis reveals registration patterns consistent with operational security practices employed by nation-state threat actors. Domains are registered through different providers to prevent single-point disruption, employ HTTPS with valid “Let’s Encrypt” certificates to avoid browser security warnings, and utilize naming conventions that superficially resemble legitimate organizations or technical services.

Passive DNS analysis indicates C2 domains resolve to hosting infrastructure distributed across multiple autonomous systems and geographic locations, complicating network-based blocking efforts. The threat actor maintains multiple simultaneous C2 domains for operational redundancy, with individual samples configured to communicate with specific domains based on target or operational phase.

Victimology and Target Analysis

This UNC6384 campaign demonstrates precise targeting of European diplomatic entities, with a focus on organizations involved in cross-border policy, defense cooperation, and multilateral coordination activities.

Confirmed Targets

Hungarian Diplomatic Entities

Arctic Wolf identified malicious LNK files delivered to Hungarian diplomatic personnel using European Commission meeting themes as lures. The “Agenda_Meeting 26 Sep Brussels” lure references an authentic Directorate-General for Enlargement and Eastern Neighbourhood meeting that was scheduled for September 26, 2025, in Brussels, addressing the harmonization of border procedures and facilitation of free movement of goods at EU-Western Balkans border crossing points.

Belgian Diplomatic Entities

Targeting of Belgian diplomatic personnel was confirmed through delivery of lures themed around Joint Arms Training and Evaluation Centre workshops on wartime defense procurement scheduled for September 9-11, 2025. Belgium’s role as host nation for NATO headquarters and numerous EU institutions makes Belgian diplomatic entities valuable intelligence targets for monitoring alliance activities and policy development.

Serbian Government Entities

StrikeReady research documented targeting of Serbian government aviation departments using lures themed around NAJU flight training plans for October 2025. This targeting aligns with Serbian government’s complex diplomatic position balancing EU accession aspirations with traditional relationships with Russia and China, making Serbian government communications valuable for monitoring geopolitical alignment and policy trajectories.

Additional European Targeting

Infrastructure analysis and malware sample pivoting identified additional campaigns targeting diplomatic entities in Italy and the Netherlands, with lures including “EPC invitation letter Copenhagen 1-2 October 2025” suggesting targeting around European Political Community summit activities.

Targeting Rationale

The geographic and thematic focus of this campaign indicates intelligence collection priorities aligned with PRC strategic interests in European defense cooperation, cross-border infrastructure development, and multilateral diplomatic coordination.

Specific targeting themes include:

Defense and Security Cooperation

Lures referencing defense procurement workshops and military training suggest interest in NATO and EU defense initiatives, procurement decisions, and military readiness assessments during the period of heightened European security concerns following Russia’s invasion of Ukraine.

Cross-Border Infrastructure and Trade

Targeting around EU-Western Balkans border facilitation and free movement of goods initiatives indicates intelligence requirements concerning European supply chain resilience, infrastructure development in candidate countries, and trade policy evolution affecting China’s economic interests.

Multilateral Diplomatic Coordination

Focus on European Commission meetings, European Political Community summits, and NATO-related events demonstrates interest in understanding alliance cohesion, policy coordination mechanisms, and potential divisions or disagreements within European multilateral frameworks.

Comparison with Historical Targeting

Google’s March 2025 reporting documented UNC6384 targeting diplomats primarily in Southeast Asia, representing traditional Chinese intelligence collection priorities in a region of direct territorial and economic interest. The expansion to European diplomatic targeting observed in this campaign indicates either broadened operational mandate or deployment of additional operational teams with geographic specialization. The consistency in tooling and techniques across both geographic theaters suggests centralized tool development with regional operational deployment.

Attribution Assessment

Arctic Wolf Labs assesses with high confidence that this campaign is attributable to UNC6384, a Chinese-affiliated cyber espionage threat actor. This attribution is based on multiple converging lines of evidence including malware tooling, tactical procedures, targeting alignment, and infrastructure overlaps with previously documented UNC6384 operations.

Impact Analysis

Successful compromise of diplomatic entities by UNC6384 poses significant national security implications extending beyond immediate data theft to encompass long-term intelligence collection, strategic positioning, and potential influence operations.

Intelligence Collection Capabilities

The PlugX malware deployed in this campaign acts as a remote-access implant, providing persistent unauthorized control over compromised endpoints, and granting operators the ability to conduct exfiltration of classified or sensitive documents, monitoring of real-time policy discussions and decision-making processes, collection of credentials for accessing diplomatic networks and partner systems, and surveillance of diplomatic calendars and travel plans.

Successful long-term compromise enables collection of strategic intelligence concerning European foreign policy development, defense cooperation initiatives, economic policy coordination, negotiating positions for international agreements, internal assessments of geopolitical situations, and relationship dynamics within multilateral frameworks. This intelligence serves People’s Republic of China strategic planning by providing early warning of policy shifts, identifying opportunities for influence or division within alliances, understanding economic regulatory developments affecting Chinese interests, and assessing military cooperation and capability development trends.

Operational Security Implications

The campaign’s exploitation of ZDI-CAN-25373, a vulnerability disclosed in March 2025, within six months of public disclosure demonstrates UNC6384’s capability for rapid vulnerability adoption. This timeline suggests either direct monitoring of vulnerability disclosures with rapid development cycles, or potential pre-disclosure awareness through other intelligence channels. The group’s willingness to exploit vulnerabilities that have been publicly documented as actively being exploited by multiple nation-state actors indicates risk tolerance and confidence in success rates despite increased defender awareness.

The evolution of CanonStager from approximately 700KB to 4KB between September and October 2025 indicates active development responding to detection challenges. This rapid iteration cycle suggests either dedicated development resources or access to broader Chinese state-sponsored malware development infrastructure supporting multiple operational groups.

Broader Campaign Scope

Infrastructure analysis and malware sample pivoting conducted by Arctic Wolf Labs and recently documented by StrikeReady researchers indicates this campaign extends beyond Hungarian and Belgian diplomatic targeting to encompass broader European diplomatic entities, including Serbian government agencies, Italian diplomatic entities, Netherlands diplomatic organizations, and likely additional targets not yet identified through available telemetry.

The breadth of targeting across multiple European nations within a condensed timeframe suggests either a large-scale coordinated intelligence collection operation or deployment of multiple parallel operational teams with shared tooling but independent targeting. The consistency in tradecraft across disparate targets indicates centralized tool development and operational security standards even if execution is distributed across multiple teams.

Mitigation Recommendations

Organizations, particularly those in diplomatic and government sectors, should implement the following defensive measures to protect against UNC6384 operations and similar nation-state espionage campaigns.

Immediate Actions

As there is no official patch for the ZDI-CAN-25373 vulnerability, the blocking or restricting of the usage of .lnk files from questionable sources can be carried out by deactivating the automatic resolution of them in Windows Explorer. This should be put in place across all Windows systems, prioritizing endpoints used by personnel with access to sensitive diplomatic or policy information. While this vulnerability was disclosed in March 2025, adoption by threat actors within months of disclosure necessitates urgent monitoring and countermeasures.

Review and block C2 infrastructure identified in this report, including racineupci[.]org, dorareco[.]net, naturadeco[.]net, cseconline[.]org, vnptgroup[.]it.com, and paquimetro[.]net at network perimeters and within web filtering solutions. Implement monitoring for attempted connections to these domains even after blocking, to identify potentially compromised systems attempting C2 communication.

Conduct searches across endpoint environments for the presence of Canon printer assistant utilities (specifically cnmpaui.exe) in unusual locations including user AppData directories, especially when accompanied by cnmpaui.dll and cnmplog.dat files in the same directory. Investigate any instances of legitimate Canon printer binaries executing from non-standard installation directories.

Continuous user education, such as general security awareness training, is one of the most important elements in preventing malicious entities from obtaining access to your networks. Ensure all employees are aware of good cybersecurity hygiene practices, including training on spotting the typical red flags of a phishing attack, and consider implementing a Cyber Threat Intelligence (CTI) program in your organization.

For organizations without a dedicated security operations (SOC) team, Arctic Wolf® Managed Detection and Response (MDR) provides 24×7 monitoring of your networks, endpoints, and cloud environments to detect, respond to, and remediate modern cyberattacks.

Conclusions

This UNC6384 campaign demonstrates the continued evolution and operational expansion of Chinese cyber espionage capabilities targeting diplomatic entities. The threat actor’s rapid adoption of ZDI-CAN-25373 within six months of disclosure illustrates sustained capability for vulnerability exploitation integration into operational tradecraft. The expansion from documented Southeast Asia targeting to European diplomatic entities indicates either broadened intelligence collection mandates or deployment of additional operational teams with geographic specialization while maintaining centralized tool development.

The campaign’s focus on European diplomatic entities involved in defense cooperation, cross-border policy coordination, and multilateral diplomatic frameworks aligns with PRC strategic intelligence requirements concerning European alliance cohesion, defense initiatives, and policy coordination mechanisms. Successful long-term compromise of diplomatic entities provides strategic intelligence concerning policy development, negotiating positions, relationship dynamics within multilateral frameworks, and early warning of policy shifts affecting Chinese interests.

Organizations in diplomatic and government sectors should implement the detailed mitigation recommendations provided in this report, with priority focus on mitigating against ZDI-CAN-25373, blocking identified C2 infrastructure, enhancing detection for DLL side-loading attacks, and conducting proactive threat hunting for indicators of historical compromise given the extended operational timeline characteristic of nation-state espionage campaigns.

Arctic Wolf remains committed to protecting customers from advanced persistent threats and will continue enhancing detection capabilities as UNC6384 operations evolve.

How Arctic Wolf Protects Its Customers

Arctic Wolf is committed to ending cyber risk, and when active campaigns are identified, we move quickly to protect our customers. Arctic Wolf Labs has leveraged threat intelligence around UNC6384 activity to implement new detections in the Arctic Wolf® Aurora™ Platform to protect customers.

As we discover new information, we will enhance our detections to account for additional IOCs and techniques leveraged by the threat group behind this malicious activity.

APPENDIX

Indicators of Compromise

File Indicators:

Name SHA-256 MD5 Type Source
Agenda_Meeting 26 Sep Brussels.lnk 911cccd238fbfdb4babafc8d2582e80dcfa76469fa1ee27bbc5f4324d5fca539 LNK file Arctic Wolf/In-The-Wild (ITW)
cnmpaui.exe 4ed76fa68ef9e1a7705a849d47b3d9dcdf969e332bd5bcb68138579c288a16d3 Legitimate signed binary Arctic Wolf/ITW

 

 

cnmpaui.dll e53bc08e60af1a1672a18b242f714486ead62164dda66f32c64ddc11ffe3f0df Malicious DLL loader Arctic Wolf/ITW

 

 

cnmplog.dat c9128d72de407eede1dd741772b5edfd437e006a161eecfffdf27b2483b33fc7 Encrypted PlugX payload Arctic Wolf/ITW

 

 

PlugX payload (decrypted) 3fe6443d464f170f13d7f484f37ca4bcae120d1007d13ed491f15427d9a7121f dc1dba02ab1020e561166aee3ee8f5fb PlugX malware Arctic Wolf/ITW

 

 

rjnlzlkfe.ta 7168838787039d82961836e5f2f9c70f3fe7c4d99a6c7c61405b3364ce37e760 TAR archive Arctic Wolf/ITW

 

 

AA.zip f8d03814986599ed98ce8c83fbc9ce55b83095c179c54ec555c4ab372fa99700 Archive container Arctic Wolf/ITW

 

 

Agenda_Meeting 26 Sep Brussels.zip bb491248bb8f6067af39e196b11f4e408a7a3885704cadbd4266db52ae4b03e2 0a02938e088b74fe6be2f10bb9133f2a Campaign delivery archive Arctic Wolf/ITW

 

 

JATEC workshop on wartime defence procurement (9-11 September).zip f15c9d7385cffd1d04e54c5ffdb76526 Campaign delivery archive StrikeReady

 

EPC invitation letter Copenhagen 1-2 October 2025.zip 227045c5c5c47259647f280bee8fe243 Campaign delivery archive StrikeReady

 

NAJU Plan Obuka OKTOBAR 2025.lnk 0d0dd1cbde02e4e138c352b82a0288cc LNK file (Serbian campaign) StrikeReady

 

NAJU Plan Obuka OKTOBAR 2025.zip f2d1fa1890e409996ed4a23bc69461fe Campaign delivery archive StrikeReady
cnmpaui.dll c96338533d0ab4de8201ce1f793e9ea18d30c6179daf1e312e0f01aff8f50415 CanonStager Arctic Wolf/ITW

 

 

cnmpaui.dll e53bc08e60af1a1672a18b242f714486ead62164dda66f32c64ddc11ffe3f0df CanonStager Arctic Wolf/ITW

 

 

cnmpaui.dll ae8d2cef8eac099f892e37cc50825d329459baa9625b71fb6f4b7e8f33c6ccce CanonStager Arctic Wolf/ITW

 

 

cnmpaui.dll 716637a424bce58ff8c75e40b6e29c33318ff185af6e9e62d85b61e56a560eac

 

CanonStager Arctic Wolf/ITW

 

 

cnmpaui.dll ee9295fa36e29808ff36beb55be328b68d82f267d2faa54db26e0bf86b78fa56 CanonStager Arctic Wolf/ITW

 

 

SecurityScan.zip 1564e19b36ffc4e12becc4fb73359de13191ac8df62def45f045efbd6ef36e79

 

Campaign delivery archive Arctic Wolf/ITW

 

 

Utensils.zip 218ed813d8a4d9d05473338795021c66012cd6c36368561d3aaf831a5c494740

 

Campaign delivery archive Arctic Wolf/ITW

 

 

XgPK9CpZENdh.js

 

c3b7abcb583b90559af973dd18bf5ccba48d3323e5e2e8bc0b11ff54425e34dd

 

JavaScript delivery script

 

Arctic Wolf/ITW

 

 

oxF3dIMDi339.js 274adf7f60e0799b157e7524d503d345f6870010703fb6b56a3dd1e62b4de3e8 JavaScript delivery script

 

Arctic Wolf/ITW

 

 

No.4638.hta 7a49310a9192cab1aa05256b6ca0d0c1a54fe084b103ff4df2d17be9effa3300 HTA delivery file Arctic Wolf/ITW

 

 

rphbqultm.ta f04340f93e2f5f7d6d5521572f17c5b80f39984ee6b4b8c0899380e95a825127 Tar Archive Arctic Wolf/ITW

 

cnmpaui.dll CanonStager Arctic Wolf/ITW

 

cnmpaui.dat d70600f0e4367e6e3e07f7b965b654e5bfbcb0afbccfe0f6a9a8d9f69c7061a3 Encrypted PlugX payload

 

Arctic Wolf/ITW

 

 

Network Indicators

Command and Control Domains
racineupci[.]org (Port 443, HTTPS)
racineupci[.]org (Port 443, HTTPS)
naturadeco[.]net (Port 443, HTTPS)
cseconline[.]org (Port 443, HTTPS)
vnptgroup[.]it[.]com (Port 443, HTTPS)
paquimetro[.]net (Port 443, HTTPS)

 

Delivery Infrastructure
mydownload.z29[.]web.core.windows[.]net
mydownloadfile[.]z7.web.core.windows[.]net
mydownfile[.]z11.web.core.windows[.]net
d32tpl7xt7175h[.]cloudfront[.]net

 

User Agent String
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 10.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)

 

Host Indicators:

Mutex Names
uUbAmgDu
esUdgquBv

 

Registry Keys Created
Software\Microsoft\Windows\CurrentVersion\Run\CanonPrinter

 

Registry Keys Queried
Software\CLASSES\ms-pu Value CLSID
Software\Microsoft\Windows\CurrentVersion\InternetSetting Value ProxyEnable, ProxyServer
Software\Microsoft\Internet Explorer\Version Vector Value IE
Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform
Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform

 

File Paths
C:\Users[Username]\AppData\Roaming\SamsungDriver\cnmpaui.exe
C:\Users[Username]\AppData\Roaming\Intelnet*
C:\Users[Username]\AppData\Roaming\VirtualFile*
C:\Users[Username]\AppData\Roaming\SecurityScan*
C:\Users[Username]\AppData\Roaming\DellSetupFiles*
C:\Users[Username]\AppData\Local\Temp\rjnlzlkfe.ta
C:\Users[Username]\AppData\Local\Temp\krnqdyvmlb.ta
C:\Users[Username]\AppData\Local\Temp\tmp.dat

 

Decoy PDF Files
Agenda_Meeting 26 Sep Brussels_Facilitating the Free Movement of Goods at EU-WB BCPs.pdf
EPC invitation letter Copenhagen 1-2 October 2025.pdf
NAJU Plan Obuka OKTOBAR 2025.pdf

 

Applied Countermeasures

YARA Rules:

import "pe"

rule targeted_UNC6384_PlugX_2025 : extended description
{
    meta:
        description = "Detects PlugX RAT variant deployed by UNC6384 in 2025 European diplomatic targeting campaign"
        author = "Arctic Wolf Labs"
        distribution = "TLP:GREEN"
        version = "1.0"
        last_modified = "2025-10-12"
        hash1_md5 = "dc1dba02ab1020e561166aee3ee8f5fb"
        hash1_sha256 = "3fe6443d464f170f13d7f484f37ca4bcae120d1007d13ed491f15427d9a7121f"
        
    strings:
        $str1 = "%allusersprofile%\\" ascii wide
        $str2 = "SecurityScan" ascii wide
        $str3 = "CanonPrinter" ascii wide
        $str4 = {63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 73 00 74 00 61 00 72 00}
        $str5 = {57 00 5C 00 5C 00 2E 00 5C 00 2A 00 3A 00}
        $str6 = {26 00 3D 00 25 00 53 00 25 00 63 00 74 00 3D 00 25 00 6C 00 64 00 25 00 53}
        
    condition:
        uint16(0) == 0x5a4d and 
        filesize < 1500KB and 
        all of ($str*)
}

rule targeted_UNC6384_CanonStager_Loader: extended description
{
    meta:
        description = "Detects CanonStager DLL loader used for side-loading PlugX payload"
        author = "Arctic Wolf Labs"
        distribution = "TLP:GREEN"
        version = "1.0"
        last_modified = "2025-10-12"
        hash1_sha256 = "e53bc08e60af1a1672a18b242f714486ead62164dda66f32c64ddc11ffe3f0df"
        
    strings:
        $str1 = ".dat" wide
        $str2 = "\\cnmplog" wide
        
        // RC4 decryption loop patterns
        $code1 = {43 0F B6 ?? 0F B6 [3]00 D0 0F B6 ?? 8A 74 [2]88 74 [2]88 54 [2]8B 7? [2]02 54 [2]0F B6 ?? 0F B6 [3]32 14 ?? [0-4] 88 14 ?? 41 39 ?? 75 C?}
        $code2 = {0F B6 [3] 89 ?? 83 E? 0F 00 D0 02 ?? [1-2] 0F B6 ?? 8A 74 [2] 88 74 [2] 4? 88 54 [2]81 F? 00 01 00 00 75 D?}
        $code3 = {40 89 ?? 0F B6 C0 0F B6 [3]00 D9 88 9? [4-5]0F B6 F? 8A 7C 3? ?? 88 7C 0? ?? 88 5C 3? ?? 02 5C 0? ?? 0F B6 F? 0F B6 5C 3? ??}
        
    condition:
        uint16(0) == 0x5a4d and 
        all of ($str*) and 
        2 of ($code*)
}

rule targeted_UNC6384_LNK_Exploitation: extended description
{
    meta:
        description = "Detects malicious LNK files exploiting ZDI-CAN-25373 to deploy UNC6384 payloads"
        author = "Arctic Wolf Labs"
        distribution = "TLP:GREEN"
        version = "1.0"
        last_modified = "2025-10-12"
        
    strings:
        $lnk_header = {4C 00 00 00 01 14 02 00}
        $powershell = "powershell" nocase
        $tar_extract = "tar" nocase
        $cnmpaui = "cnmpaui.exe" nocase
        $temp_path = "$Env:temp" nocase ascii wide
        $readbytes = "ReadAllBytes" nocase
        
    condition:
        $lnk_header at 0 and
        filesize < 10KB and
        $powershell and
        $tar_extract and
        ($cnmpaui or $temp_path) and
        $readbytes
}

 

Detailed MITRE ATT&CK® Mapping

Tactic Technique Procedure Evidence
Resource Development T1587.001 – Develop Capabilities: Malware Refinement of CanonStager from approx. 700KB in May to 4KB in October. Comparisons of the CanonStager loader component between the sample documented by GTIG and samples found in early September and October 2025 indicates active development and refinement of the malware delivery mechanism.
Resource Development T1608.001 – Stage Capabilities: Upload Malware UNC6384 actors staged malware on their infrastructure for direct download onto compromised devices. Observed delivery infrastructure used to deliver their payloads:

mydownload.z29[.]web.core.windows[.]net

mydownloadfile[.]z7.web.core.windows[.]net

mydownfile[.]z11.web.core.windows[.]net

d32tpl7xt7175h[.]cloudfront[.]net

 

Initial Access T1566.001 – Phishing: Spearphishing Attachment Delivery of malicious LNK files via targeted emails themed around diplomatic conferences and meetings. LNK files: Agenda_Meeting 26 Sep Brussels.lnk, JATEC workshop lure, EPC invitation letter.
Initial Access T1189 – Drive-by Compromise Captive portal hijacking redirecting browsers to malicious update pages (documented in Google research). GTIG documentation of AitM attacks redirecting legitimate captive portal checks.
Execution T1059.001 – Command and Scripting Interpreter: PowerShell LNK files execute obfuscated PowerShell commands to extract and decompress TAR archives. PowerShell commands in LNK files extract rjnlzlkfe.ta and krnqdyvmlb.ta.
Execution T1059.001 – Command and Scripting Interpreter: JavaScript JavaScript file delivers cnmpaui.exe, cnmpaui.dll and cnmpaui.dat. The JavaScript facilitated payload CanonStager and PlugX retrieval from the same CloudFront-based C2.
Execution T1204.002 – User Execution: Malicious File User opens LNK file disguised as conference agenda or policy document. Diplomatic-themed file names leveraging authentic event details.
Execution T1106 – Native API Both CanonStager and PlugX use dynamic API resolution native API calls. UNC6384 uses native API calls in CanonStager to load and execute the PlugX payload via EnumSystemGeoID.

PlugX uses a variety of dynamically resolved APIs.

Execution T1129 – Shared Modules LoadLibraryA is called by PlugX to load additional modules. PlugX calls LoadLibraryA to load the following modules:
advapi32.dll, Ws2_32.dll, User32.dll, Shell32.dll, Shlwapi.dll, Psapi.dll, Version.dll, Msvrt.dll, Winhttp.dll, Ole32.dll
Persistence T1547.001 – Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder Creation of registry Run key entries pointing to malware in AppData directories. Registry key: Software\Microsoft\Windows\CurrentVersion\Run\CanonPrinter.
Defense Evasion T1574.002 – Hijack Execution Flow: DLL Side-Loading Malicious DLL loaded by legitimate signed Canon printer assistant binary. cnmpaui.exe (legitimate signed) loading malicious cnmpaui.dll.
Defense Evasion T1027 – Obfuscated Files or Information RC4 encryption of PlugX payload, code obfuscation, control-flow flattening. cnmplog.dat encrypted with 16-byte RC4 key, MSGInitialize implements control-flow flattening obfuscation
Defense Evasion T1027.009 – Obfuscated Files or Information: Embedded Payloads PlugX payload embedded within encrypted .dat file alongside legitimate binaries. cnmplog.dat containing encrypted PlugX within TAR archive.
Defense Evasion T1055 – Process Injection In-memory loading of PlugX payload into legitimate cnmpaui.exe process space. Manual PE mapping and execution via EnumSystemGeoID callback.
Defense Evasion T1140 – Deobfuscate/Decode Files or Information Runtime decryption of encrypted payload and strings. RC4 decryption of cnmplog.dat, runtime string decryption in PlugX.
Defense Evasion T1036.005 – Masquerading: Match Legitimate Name or Location Malware uses printer-related directory and file names mimicking legitimate software. Directory names: SamsungDriver, DellSetupFiles; Registry value: CanonPrinter.
Defense Evasion T1218 – System Binary Proxy Execution Execution through legitimate signed binary to evade application whitelisting. Legitimate Canon cnmpaui.exe with valid expired certificate loading malicious DLL.
Defense Evasion T1497.001 – Virtualization/Sandbox Evasion: System Checks CheckRemoteDebuggerPresent API calls to detect debugging environments. API calls documented in malware analysis section.
Defense Evasion T1553.002 – Subvert Trust Controls: Code Signing Use of legitimately signed binaries and stolen/expired code signing certificates. Canon binary signed by Symantec Class 3, GTIG documented STATICPLUGIN signed by Chengdu Nuoxin Times Technology.
Defense Evasion T1562.001 – Impair Defenses: Disable or Modify Tools Anti-debugging techniques and checks to prevent analysis. CheckRemoteDebuggerPresent, anti-analysis obfuscation.
Discovery T1082 – System Information Discovery Collection of system information for C2 check-in and fingerprinting. Initial C2 check-in with system fingerprint data in URL parameters.
Discovery T1083 – File and Directory Discovery Malware searches for and reads files in user profile directories. PowerShell get-childitem commands, file system enumeration.
Discovery T1057 – Process Discovery Enumeration of running processes for anti-analysis and operational purposes. Standard PlugX reconnaissance capabilities.
Discovery T1012 – Query Registry Registry queries for Internet Explorer version, proxy settings, and system configuration. Registry queries:

Software\CLASSES\ms-pu Value CLSID
Software\Microsoft\Windows\CurrentVersion\InternetSetting Value ProxyEnable, ProxyServer

Software\Microsoft\Internet Explorer\Version Vector Value IE

Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform

Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform

Command and Control T1071.001 – Application Layer Protocol: Web Protocols HTTPS communication over port 443 for C2 traffic. WinHttpConnect to C2 domains over port 443.
Command and Control T1573.001 – Encrypted Channel: Symmetric Cryptography HTTPS encryption of C2 communications. TLS certificates on C2 domains, HTTPS protocol usage.
Command and Control T1132.001 – Data Encoding: Standard Encoding Encoding of C2 parameters and data in URL query strings. URL parameters with encoded data: /download?t=1760103992&LeQa=PKDugp
Command and Control T1001.003 – Data Obfuscation: Protocol Impersonation Impersonation of legitimate browser traffic through user agent strings. User-Agent: Mozilla/5.0 (compatible; MSIE 9.0…).
Command and Control T1105 – Ingress Tool Transfer Download of additional payloads and tools from C2 infrastructure. STATICPLUGIN downloading MSI packages, potential for additional tool deployment.
Exfiltration T1041 – Exfiltration Over C2 Channel Data exfiltration through established HTTPS C2 channels. Standard PlugX exfiltration capabilities over C2 infrastructure.

 

About Arctic Wolf Labs

Arctic Wolf Labs is a group of elite security researchers, data scientists, and security development engineers who explore security topics to deliver cutting-edge threat research on new and emerging adversaries, develop and refine advanced threat detection models with artificial intelligence and machine learning, and drive continuous improvement in the speed, scale, and detection efficacy of Arctic Wolf’s solution offerings.

Arctic Wolf Labs brings world-class security innovations to not only Arctic Wolf’s customer base, but the security community at large.

Share this post: