Chinese APT Supply Chain Espionage
You’re part of BioGenix Solutions’ incident response team. CFCS (Center for Cybersikkerhed) has tipped off your CISO – indicators from a European campaign match your infrastructure. You need to find out if you’re compromised, how deep the attacker is, and what they’ve taken.
Investigate and contain a sophisticated supply chain intrusion while protecting proprietary R&D, preserving forensic evidence, coordinating with CFCS, and deciding how far to trust a vendor whose software may have been weaponized.
New to facilitating Malware & Monsters? Start here:
IM Quick Start Guide – Everything you need to run this scenario in one concise document
It is Thursday afternoon at BioGenix Solutions. CFCS contacted your CISO last night with intelligence from a European campaign – indicators match your infrastructure. Your teams are assembled to investigate.
HANSEN-SAP-01, which the ITSM system lists as scheduled for decommissioning, authenticated into your Azure cloud R&D environment twice last nightCFCS believes you are an active target in a supply chain campaign. Your SOC findings this morning confirm something is wrong. The question is how deep, and how long it has been there.
Sector: Precision fermentation and industrial enzyme engineering
Size: 1,800 employees, headquarters in Copenhagen
Current Situation: BioGenix completed a merger 6 months ago, inheriting legacy infrastructure that has not yet been fully integrated or decommissioned. The company’s crown jewel – GenixLibrary – contains years of proprietary genomic and fermentation IP.
HANSEN-SAP-01), scheduled for decommissioning since September 2024, still network-connected. Part of the inherited infrastructure.GenixLibrary contains BioGenix’s entire competitive advantage in precision fermentation. If a foreign adversary has been systematically collecting this IP, the damage is permanent and irreversible – no amount of incident response recovers trade secrets once exfiltrated.
Three workstations (BIOGEN-RD-WS-01, WS-02, WS-03) all show the same pattern: the calibration service calibsvc.exe spawned a PowerShell process with an encoded command, which then ran net.exe user svc-rdbridge-admin /domain.
The CaliSyncPro update v4.2.1 completed at 22:13 last night. The process anomalies started at 22:14.
HANSEN-SAP-01 is an on-premise SAP NetWeaver server that should be offline – it was marked for decommissioning 18 months ago. Last night it authenticated as svc-rdbridge-admin into your Azure AD environment, bypassing Conditional Access via a legacy exception called COLLBRIDGE-EXCL-003.
Six sequential batch reads of GenixLibrary sequence files, originating from the Azure cloud environment, between 22:21 and 23:48. The account used: svc-rdbridge-admin. No interactive logon preceded any of these sessions.
Anomalous outbound HTTPS traffic classified by your DLP system as Microsoft Graph API telemetry. The destination resolves to graph-api-sync.bioanalytics.net – a domain registered 4 months ago via a privacy proxy. CFCS flagged this exact pattern from another European victim.
What They Care About: Protecting BioGenix’s market position, IP valuation, and reputation with partners and regulators
Current State: Not yet fully briefed – knows there are “some security alerts” but doesn’t know the scope
Helpful For: Authorization for aggressive containment actions, vendor relationship decisions, board-level communication
Potential Barrier: May resist actions that create public exposure or disrupt ongoing business relationships
What They Care About: R&D pipeline integrity, system availability, the security of GenixLibrary
Current State: Alarmed – she knows GenixLibrary is the company’s crown jewel and any compromise threatens BioGenix’s competitive position
Helpful For: Technical architecture, access controls, understanding what GenixLibrary data was accessible, authorizing forensic work on cloud R&D systems
Potential Barrier: Will want forensic work to be thorough but fast, which creates tension with evidence preservation
What They Care About: Containment, evidence preservation, CFCS coordination, understanding the full scope of compromise
Current State: Running the incident response – CFCS contacted him directly last night. He has escalated to the teams for structured investigation and decision-making.
Helpful For: Forensic strategy, CFCS coordination, what ITSM records show about HANSEN-SAP-01, understanding the CFCS intelligence context
Potential Barrier: Cautious by nature; may slow decisions trying to verify before acting
What They Care About: GenixLibrary data integrity, her research team’s work, understanding what was accessed and whether results are still valid
Current State: Deeply concerned – she knows exactly what is in GenixLibrary and understands the competitive implications if it has been exfiltrated
Helpful For: What data is in GenixLibrary, which datasets represent the highest-value targets, what an adversary would want
Potential Barrier: May become emotionally focused on one specific dataset or research program and narrow the team’s scope
Hidden Agenda: BioGenix’s board expects the post-merger integration to go smoothly. A major security incident involving legacy infrastructure inherited from the merger reflects poorly on his leadership.
Secret Fear: That the exfiltration scope, once disclosed to CFCS and eventually to partners, damages BioGenix’s reputation and IP valuation permanently.
Character Arc:
Roleplay Notes: Phillip is not malicious – he’s protecting his company. His arc is about understanding that coordinated transparency with CFCS and the vendor is more protective than trying to manage this alone.
Hidden Agenda: She approved the COLLBRIDGE-EXCL-003 Conditional Access exception during the post-merger infrastructure consolidation. She knows this, and she’s aware it’s the policy gap that enabled the lateral movement.
Secret Fear: That the forensic investigation will surface her name on that exception approval.
Character Arc:
Roleplay Notes: Katrine is an asset to the response – her obstruction only appears on one specific topic. Push her gently if the team notices inconsistency in her cooperation.
Hidden Agenda: He tried to get HANSEN-SAP-01 decommissioned six months ago. The ITSM ticket is still open. Facilities and Finance blocked it for budget reasons.
Secret Frustration: He has documentation of the risk – and he’s furious it went unaddressed.
Character Arc:
Roleplay Notes: Bent is a sympathetic figure. His caution and frustration are both justified. He becomes more decisive as the team validates his prior risk assessments.
Hidden Agenda: She suspects the attacker specifically targeted the highest-value GenixLibrary datasets – the core fermentation IP and proprietary enzyme sequences – because those represent BioGenix’s entire competitive moat.
Secret Knowledge: She knows which competitor nations would benefit most from this specific data – she’s been tracking parallel research programs at Chinese state-backed institutions.
Character Arc:
Roleplay Notes: Ida’s technical knowledge is a pivot point for understanding the strategic dimension. She can help the team understand why this incident is more than corporate espionage.
2025-11-20: Domain graph-api-sync.bioanalytics.net registered via privacy proxy.
2025-12-04 (estimated): CaliSyncPro update v4.2.1 compiled with Winnti dropper embedded. CaliSync Instrumentation GmbH is fully compromised – their build pipeline is producing weaponized updates. Their code-signing certificate (SN 4A9F02B1) remains VALID.
2025-12-04: CaliSyncPro v4.2.1 delivered via vendor update channel. OCSP check performed at deployment – certificate returns VALID (because it has not been revoked; the supplier is compromised, not their certificate). Winnti dropper executes on three bioreactor workstations, harvests NTLM credential hash for svc-rdbridge-admin from memory via encoded PowerShell command.
2025-12-10 (first session): HANSEN-SAP-01 uses harvested svc-rdbridge-admin hash (Pass-the-Hash via NTLM) to authenticate through the Collaborative Bridge into Azure AD, bypassing Conditional Access via COLLBRIDGE-EXCL-003. First GenixLibrary batch read session: 19 files, Fermentation-Seq-Archive-2023.
2025-12-10 to 2026-04-14: Periodic off-hours batch read sessions. ~7 GB of historical R&D data exfiltrated via port 443 to graph-api-sync.bioanalytics.net, TLS SNI spoofed as graph.microsoft.com. In the final weeks, active collection shifts to core IP – ~2-3 GB of high-value enzyme engineering datasets targeted.
2026-04-15 (overnight): Process anomaly on calibration workstations triggers EDR alert. CFCS contacts Bent Sejrø with intelligence from a European campaign – indicators match BioGenix infrastructure.
2026-04-16 13:00 (now): Teams assembled. CFCS intelligence and SOC findings converge.
Supply Chain Entry:
v4.2.1 update from CaliSync Instrumentation GmbH4A9F02B1) is VALID – OCSP was checked and returned valid. Everything looks legitimate, but the payload is malicious.calibsvc.exe on 3 bioreactor workstationssvc-rdbridge-admin NTLM hash from memoryKernel-Level Persistence on HANSEN-SAP-01:
4A9F02B1) loaded at ring-0NtQuerySystemInformation hook hides 5 processes from standard enumerationtasklist.exe203.0.113.44:443HANSEN-SAP-01 excluded from SOC monitoring under decommission-backlog exclusionLateral Movement:
HANSEN-SAP-01 using harvested hash – no interactive logon ever recordedCOLLBRIDGE-EXCL-003 Conditional Access exception (created 2024-11-14 during post-merger consolidation, never reviewed, no expiry) bypasses MFA requirementExfiltration:
GENIX-PROD-01 and AZURE-RD-ENV-01graph.microsoft.com; actual destination graph-api-sync.bioanalytics.netsvc-rdbridge-admin excluded from off-hours DLP policy as a service accountActive persistence: Kernel rootkit on HANSEN-SAP-01 with live C2 connection to 203.0.113.44:443.
Active exfiltration channel: A session was underway at time of detection – status unclear.
Suspected scope: ~7 GB historical R&D data already exfiltrated, with ~2-3 GB of active core IP collection transfers in progress (~10 GB total estimated).
Attribution indicators: Indicators match CFCS bulletin CB-2026-0312 – same supply chain pattern observed across other European biotech/pharma victims.
Certificate status: VALID. The supplier (CaliSync GmbH) is fully compromised and does not know it. This is not a certificate revocation problem – it is a compromised vendor problem.
Initial Discovery:
Key Decision: Isolate HANSEN-SAP-01 first (cuts active Azure access) vs isolate calibration workstations first (stops ongoing harvesting but attacker already has credentials)
Correct Priority: HANSEN-SAP-01 – the attacker has current active Azure R&D access from there right now
Forensic Discovery:
Key Decision: Preserve memory image and kernel driver artifact before any remediation action
Red Flag: Team reimages without capturing memory image – attribution and CFCS coordination value permanently lost
Lateral Movement Confirmed:
Key Decision: Revoke credentials and close exception immediately vs wait for full scope picture. Both steps needed – credential revocation alone is insufficient if the exception remains open for other accounts.
Red Flag: Team delays credential revocation – active cloud R&D access continues during the delay
Exfiltration Scope:
Key Decision: How to scope the damage assessment – what can be confirmed vs what is still under investigation. CFCS wants indicators. The vendor (CaliSync GmbH) does not know they are compromised.
Red Flag: Team focuses on the relatively small volume and underestimates impact. ~10 GB of targeted core IP is catastrophic.
Multi-Stakeholder Coordination:
Key Decision: How to share indicators with CFCS while managing the vendor notification – CaliSync GmbH is still pushing compromised updates to other customers
Red Flag: Team delays vendor notification – every hour of delay means other CaliSync customers remain exposed to the weaponized update
Post-Incident:
Memory Forensics:
tasklist.exeSupply Chain Integrity Verification (beyond certificate validation):
Behavioral Analysis (process tree):
calibsvc.exe spawning PowerShell with encoded command is a high-confidence indicatorNetwork Traffic Analysis:
graph-api-sync.bioanalytics.net destination despite SNI spoofingLegacy System Governance:
HANSEN-SAP-01 was the persistence anchor; decommissioning it would have closed the attack pathConditional Access Policy Review:
COLLBRIDGE-EXCL-003 would have stopped all lateral movement sessionsSignature-Based Antivirus:
tasklist.exe returns clean output – rootkit hides own entriesHANSEN-SAP-01 returned clean throughout 90-day dwell periodDLP Alert Tuning (alone):
If team isolates workstations before HANSEN-SAP-01:
HANSEN-SAP-01If team rushes to reimage without preserving forensics:
If team delays vendor notification waiting for CFCS approval:
What the teams have at 13:00:
calibsvc.exe → svchost.exe → powershell.exe -encodedCommand → net.exe user svc-rdbridge-admin /domain on BIOGEN-RD-WS-01, WS-02, WS-03HANSEN-SAP-01 authenticated as svc-rdbridge-admin twice last night; COLLBRIDGE-EXCL-003 exception bypassed Conditional Accesssvc-rdbridge-admin, no interactive logonHandout: Distribute Handout A: Supply Chain Evidence
Drive toward the isolation sequence:
HANSEN-SAP-01? It’s in the Collaborative Bridge dependency chain – Katrine and Bent both have a stake.”Conditional outcomes:
HANSEN-SAP-01 first: Active Azure R&D access cut. Collaborative Bridge drops briefly. Calibration workstations isolated next – rootkit artifacts preserved.HANSEN-SAP-01 isolation: Attacker maintains active Azure access during delay. Additional GenixLibrary read sessions possible before cutoff.Success indicators: Incident command established, isolation sequence prioritized (HANSEN-SAP-01 first), evidence preservation owner assigned.
“Hardware-assisted memory enumeration of HANSEN-SAP-01 is complete. Standard tasklist.exe shows 87 processes. Physical memory enumeration shows 92. Five hidden PIDs. PID 4028 has an ESTABLISHED connection to 203.0.113.44:443 right now. The kernel driver masking these processes is signed by CaliSync Instrumentation GmbH – and that certificate is VALID. OCSP check confirms it. The signature is legitimate. But the payload is not. And HANSEN-SAP-01 hasn’t had a security patch since August 2024. It’s been excluded from SOC monitoring since the decommission ticket was opened.”
Handout: Distribute Handout B: Rootkit Forensic Artifacts
Drive toward evidence preservation:
Conditional outcomes:
Success indicators: Memory image captured, kernel driver artifact preserved, CFCS artifact sharing decision made, vendor compromise hypothesis formed.
“Correlation complete. svc-rdbridge-admin authenticated from HANSEN-SAP-01 into the Azure R&D environment multiple times over the dwell period. Every session is NTLM. No interactive logon preceding any session – not one. COLLBRIDGE-EXCL-003 is a Conditional Access exception created on 2024-11-14 during the post-merger infrastructure consolidation. Expiry: NONE SET. Last reviewed: NEVER.”
Handout: Distribute Handout C: Lateral Movement Log
Drive toward credential revocation and policy closure (two-step close):
svc-rdbridge-admin – and does that scope match your current exfiltration estimate?”COLLBRIDGE-EXCL-003 was created during post-merger consolidation and never reviewed. What governance process should have caught this?”Surface Katrine’s involvement (optional pressure):
Conditional outcomes:
Success indicators: svc-rdbridge-admin credentials revoked, COLLBRIDGE-EXCL-003 closed, scope of Azure resources documented.
“Approximately 10 gigabytes outbound over port 443, destination graph-api-sync.bioanalytics.net. Domain registered 4 months ago, privacy proxy, self-signed certificate impersonating Microsoft. DLP classified all of it as Microsoft telemetry – it trusted the SNI header and never validated the certificate. GenixLibrary audit log shows off-hours batch read sessions since December. About 7 gig of historical R&D data, and in the last few weeks, a shift to active collection – 2 to 3 gig of core enzyme engineering IP. svc-rdbridge-admin was excluded from off-hours movement policy as a service account. This was patient, targeted collection – not a smash-and-grab.”
Handout: Distribute Handout D: Exfiltration Traffic Analysis
Drive toward scoped damage assessment and vendor notification decision:
Phillip Christensen enters:
“I’ve just been briefed. Ten gigabytes doesn’t sound like much. Help me understand why this is serious.”
Present the tension: small volume but catastrophic value. The core fermentation IP is BioGenix’s entire competitive advantage.
Conditional outcomes:
Success indicators: Exfiltration scope documented with confidence level, vendor notification decision made, CFCS artifact sharing initiated.
IC Handover: IC #1 has been running the response for 95 minutes. IC #2 arrives and receives an SBAR briefing. IC #2 says: “I have command.” The team must adapt to the new IC while maintaining momentum.
CFCS: They have confirmed this is part of a European campaign. CFCS bulletin CB-2026-0312 cites identical supply chain patterns across multiple European biotech/pharma targets. They want your memory image, kernel driver artifact, and network indicators.
CaliSync GmbH (vendor): Still unaware their build pipeline is compromised. Still pushing v4.2.1 to all customers. Someone needs to notify them – but how, and what do you share?
Drive toward coordinated external response:
If team delays vendor notification:
Facilitator reference numbers (share if asked):
CB-2026-0312Conditional outcomes:
Success indicators: IC handover complete with SBAR, CFCS artifact sharing initiated, vendor notification decision made with clear owner.
“Immediate containment is in place. You have stopped the bleeding. But approximately 10 gigabytes of targeted genomic and fermentation IP – including your core enzyme engineering datasets – may already be in the hands of a foreign intelligence service. And CaliSync GmbH is still shipping compromised software to other customers. The next decisions you make determine whether this becomes a repeat event or a turning point for BioGenix and the broader European biotech sector.”
Technical:
Governance:
Strategic:
Red flag: Debrief narrows to “Katrine should have expired the exception” – individual fault framing. Redirect toward the governance structure that should have caught it regardless of who created it.
The central dilemma – preserve forensic evidence vs. immediate eradication – forced teams to make uncomfortable tradeoffs under time pressure. Institutional debt – decommissioning backlogs, post-merger integration shortcuts, compliance exceptions with no expiry – created the conditions the attacker exploited. And the hardest part: the vendor’s certificate was VALID. Standard supply chain validation passed. The sophistication of Winnti is real. But the attack succeeded because of governance failures that predated it.
Patient adversaries reveal impatient defenses. The dwell time was not a limitation – it was a choice. And the certificate was valid the entire time.