Discovery Date: March 2025
Threat Group: FamousSparrow (Chinese APT)
Victims: U.S. trade group, Honduras government, Mexican research institute
Dormancy Period: 2022–2024
Primary Objective: Cyberespionage across sensitive sectors
Initial Entry: Undisclosed (suspected Microsoft Exchange / Windows Server exploits)
The Return of a Silent Operator
A once-dormant Chinese state-sponsored hacking group known as FamousSparrow has reemerged — and it’s no longer just probing the hospitality industry. This time, it’s hitting North America, targeting high-level organizations across the U.S., Mexico, and Honduras with upgraded malware and a broader strategic aim.
Cybersecurity researchers at ESET uncovered the renewed activity while investigating a breach at a U.S. trade association. What they found confirmed a chilling reality: FamousSparrow is back — and more capable than ever.
SparrowDoor 2.0: An Evolved Espionage Implant
The backdoor at the heart of these attacks — known as SparrowDoor — has now evolved into a more advanced digital surveillance platform. Two previously undocumented versions were discovered embedded in victim networks.
Despite the upgrades, ESET analysts confirmed direct code lineage with earlier versions, citing “substantial code overlaps” that leave no doubt this is the same threat actor from past campaigns. Notably, these implants now include:
- File exfiltration modules
- Keystroke logging
- Screenshot capture
- System monitoring and command execution
- Enhanced persistence features
These tools turn infected machines into full-spectrum espionage platforms.
Targets and Tactics: From Hotels to Governments
FamousSparrow, active since at least 2019, previously focused on infiltrating hotels and travel infrastructure, striking properties in France, Brazil, Canada, the U.K., Taiwan, and beyond. But their latest campaign reflects a strategic shift — hitting:
- A government entity in Honduras
- A scientific research institute in Mexico
- A U.S. trade group tied to economic and policy sectors
This marks a move from general surveillance to intelligence acquisition and strategic disruption.
The Toolset: Chinese Malware Arsenal Confirmed
FamousSparrow isn’t acting alone — they’re tapping into the same high-grade Chinese cyberweapons seen in campaigns by GhostEmperor, APT27, and others. Their toolkit includes:
- ShadowPad malware (modular RAT used by multiple Chinese APTs)
- Custom backdoors, loaders, and persistence mechanisms
- Living-off-the-land techniques to evade detection
- Potential ProxyLogon and ProxyShell exploitation for Exchange server access
Some victim networks were found running outdated versions of Microsoft Exchange and Windows Server, which remain highly vulnerable to publicly available exploits.
Attribution Confusion: GhostEmperor or FamousSparrow?
Several cybersecurity vendors have conflated FamousSparrow with GhostEmperor, another Chinese APT, due to overlaps in tooling and target profile. However, ESET’s research asserts that FamousSparrow is:
“…its own distinct cluster with loose links to the others.”
— Alexandre Côté Cyr, ESET
This reflects a common challenge in tracking Chinese threat actors — toolset overlap, shared infrastructure, and intentional obfuscation are all used to blur attribution lines.
Historical Context: ProxyLogon Exploitation
FamousSparrow was among the first APTs to weaponize ProxyLogon, the critical Microsoft Exchange vulnerability disclosed in March 2021. Within a single day of Microsoft’s announcement, they launched live attacks — signaling exceptional coordination and readiness.
That same speed and precision are evident again in 2025.
Strategic Implications: Cyberwarfare by Stealth
The revival of FamousSparrow signals a dangerous truth: China’s cyber arsenal is not only active — it’s evolving silently between the headlines. These are long-game operators, retooling and repositioning while the world looks elsewhere.
Their renewed activity on North American soil means:
- Espionage operations are accelerating
- Civil and private infrastructure is being actively mapped
- Research, trade, and government systems are all viable targets
And just like before, these attacks often go unnoticed until the damage is done.
Final Thought
FamousSparrow’s return is a clear reminder: Dormancy is not defeat.
In the world of state-sponsored cyberwarfare, silence means preparation.
If you’re running Microsoft Exchange, legacy Windows Server systems, or host sensitive data in sectors like trade, science, or government — it’s time to assume you’re already a target.
These aren’t hackers. These are digital insurgents.

🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
Help us bring real change! Corporate lobbying has corrupted our system for too long, and it’s time to take action. Please sign and share this petition—your support is crucial in restoring accountability to our government. Every signature counts! Thank you!
https://www.ipetitions.com/petition/restore-our-republic-end-lobbying

Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a


