A China-linked threat actor sustained multi-year covert access to Southeast Asian military and defense networks via novel, undocumented backdoors, employing a full intrusion lifecycle covering persistence, credential dumping, lateral movement, and exfiltration with minimal forensic footprint. No CVE identifiers are associated; specific backdoor names, C2 infrastructure, and IOCs are not confirmed from available summary data and require review of the primary Dark Reading source. Organizations with defense, government, or critical infrastructure ties in Southeast Asia should initiate targeted threat hunting against the confirmed MITRE ATT&CK techniques (T1547, T1071, T1078, T1059, T1053, T1027, T1041, T1560, T1105, T1036, T1003) and conduct credential and persistence audits.