Stone Panda (APT 10) continues global espionage campaigns tied to China’s MSS.
🎯 Targets: healthcare, defense, academia
🛠️ Tools: Mimikatz, BloodHound, Impacket
🌍 Active in the U.S., UK, Japan, India & more
Espionage vs disruption — which do you see as their long-term mission?
Follow @technadu for continuous APT tracking.

#StonePanda #APT10 #CyberEspionage #ChinaAPT #ThreatActor #Cyble

#ESETresearch has uncovered the #MirrorFace Operation AkaiRyū, which extends the group’s usual focus beyond Japan into Europe. The initial lure centered around Expo 2025 in Japan, compromising a Central European diplomatic institute.
https://www.welivesecurity.com/en/eset-research/operation-akairyu-mirrorface-invites-europe-expo-2025-revives-anel-backdoor/

Surprisingly, #MirrorFace used #ANEL – a backdoor historically linked only to #APT10 – highlighting a shift in the group’s tactics and reinforcing suspicions that MirrorFace could be part of the APT10 umbrella.
Operation AkaiRyū began with targeted spearphishing emails referencing the victim’s past correspondence and Expo 2025 , persuading recipients to download malicious attachments.
Once the files were opened, a layered compromise chain ensued . Collaborating with the victim allowed us to perform in-depth analysis, shedding light on MirrorFace’s post-compromise behavior – from credential harvesting to dropping additional tools for lateral movement.

#MirrorFace used an intricate execution chain to stealthily run a highly tweaked #AsyncRAT within #WindowsSandbox, hampering detection efforts. This is the first time we’ve seen MirrorFace employ AsyncRAT.
In another twist, #MirrorFace utilized #VSCode remote tunnels, a tactic enabling covert access and command execution on compromised machines. This approach has also been seen with other China-aligned cyberespionage groups.
The group primarily leveraged #ANEL as a first-stage backdoor, #HiddenFace – MirrorFace’s flagship backdoor – was dropped later in the attack to bolster persistence . Notably absent this time was #LODEINFO, which #MirrorFace typically employs.

We presented our findings about Operation AkaiRyū conducted by #MirrorFace at @jpcert_ac on January 22, 2025: https://jsac.jpcert.or.jp.
IoCs available in our GitHub repo: https://github.com/eset/malware-ioc/tree/master/mirrorface

Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor

ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor.

Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024

Trend Micro has identified a spear-phishing campaign active in Japan since June 2024. Evidence about the malware used by this campaign suggests this was part of a new operation by Earth Kasha.

Trend Micro

Happy Thursday everyone!

Today's #readoftheday is brought to you by the Cybereason Security Services Team as they report their findings from a campaign they dubbed #CuckooSpear, and this is just part 1!

They attributed this campaign to #APT10, found some new tools and capabilities that the group has, and discuss the luring techniques, and much more! They talk about the techniques and tactics that they observed, they tools and LOLBAS's that were abused.

SPEAKING of techniques, APT10 used three different ways to gain persistence: scheduled tasks were created, they abused WMI Consumer Event (a method of subscribing to certain system events, then enabling an action of some sort), and creating Windows services.

This report provides great insight to the adversaries techniques, and I look forward to the rest of the parts! Enjoy and Happy Hunting!

CUCKOO SPEAR Part 1: Analyzing NOOPDOOR from an IR Perspective
https://www.cybereason.com/blog/cuckoo-spear-analyzing-noopdoor

Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting Cyborg Security, Now Part of Intel 471

CUCKOO SPEAR Part 1: Analyzing NOOPDOOR from an IR Perspective

In this report, Cybereason confirms the ties between Cuckoo Spear and APT10 Intrusion Set by tying multiple incidents together and disclosing new information about this group’s new arsenal and techniques.

Chinese hackers have unleashed a never-before-seen Linux backdoor

SprySOCKS borrows from open source Windows malware and adds new tricks.

Ars Technica
APT10: Tracking down LODEINFO 2022, part II

In the second part of this report, we discuss improvements made to the LODEINFO backdoor shellcode in 2022.

Kaspersky
Die Firmen stammen aus unterschiedlichen Branchen, einige aus der Automobilindustrie. Hinter dem Angriff soll laut Symantec die Hackergruppe Cicada stecken.
Japanische Firmen in 17 Ländern von Cyberattacke betroffen
Japanische Firmen in 17 Ländern von Cyberattacke betroffen

Die Firmen stammen aus unterschiedlichen Branchen, einige aus der Automobilindustrie. Hinter dem Angriff soll laut Symantec die Hackergruppe Cicada stecken.

Side note: this website dubbed "Intrusion Truth: We hunt APTs" (http://intrusiontruth.wordpress.com) appears to be leaking a few elements (names, addresses) of Chinese officials from the #APT10 group before the initial indictment was made public.
Is this parallel construction in action? 🤔 https://t.co/fPOFOPHTF9
Intrusion Truth

We hunt APTs

Two members of the #APT10 group indicted by the FBI, they were acting on behalf of the Tianjin State Security Bureau (天津市国家安全局), part of the Ministry of State Security (MSS) in China 🇨🇳 https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion #cyber #espionage #china
Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information

“The indictment alleges that the defendants were part of a group that hacked computers in at least a dozen countries and gave China’s intelligence service access to sensitive business information,” said Deputy Attorney General Rosenstein.  “This is outright cheating and theft, and it gives China an unfair advantage at the expense of law-abiding businesses and countries that

#Hacktivist group Intrusion Truth have gone on a doxxing spree revealing the identities of several #Chinese #hackers within #APT10. They even went to the extreme with evidence of #Uber trips to a secret government hacking facility. Recounts of previous exposures leading to indictments and subsequent negotiations for reduced espionage. Riveting stuff
https://motherboard.vice.com/en_us/article/wjka84/intrusion-truth-group-doxing-hackers-chinese-intelligence?utm_source=mbtwitter
Meet 'Intrusion Truth,' the Mysterious Group Doxing Chinese Intel Hackers

Since April last year, a group calling itself ‘Intrusion Truth’ has trickled out the real names of hackers working for Chinese intelligence. Recently the group has ramped up its efforts against a Chinese operation targeting governments and businesses.