ShadowPad
Associated Software Descriptions |
|
Name | Description |
---|---|
POISONPLUG.SHADOW | (Citation: FireEye APT41 Aug 2019) |
Groups That Use This Software |
||
ID | Name | References |
---|---|---|
G1042 | RedEcho |
(Citation: RecordedFuture RedEcho 2021) (Citation: RecordedFuture RedEcho 2022) |
G0081 | Tropic Trooper |
(Citation: Recorded Future RedEcho Feb 2021) |
G0131 | Tonto Team |
(Citation: Kaspersky CactusPete Aug 2020) |
G0096 | APT41 |
(Citation: FireEye APT41 Aug 2019) (Citation: Recorded Future RedEcho Feb 2021) |
G0143 | Aquatic Panda |
(Citation: Crowdstrike HuntReport 2022) |
G1006 | Earth Lusca |
(Citation: TrendMicro EarthLusca 2022) |
G0060 | BRONZE BUTLER |
(Citation: Recorded Future RedEcho Feb 2021) |
References
- Kaspersky Lab. (2017, August). ShadowPad: popular server management software hit in supply chain attack. Retrieved March 22, 2021.
- GReAT. (2017, August 15). ShadowPad in corporate networks. Retrieved March 22, 2021.
- Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
- Insikt Group. (2021, February 28). China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions. Retrieved March 22, 2021.
- Chen, J., et al. (2022). Delving Deep: An Analysis of Earth Lusca’s Operations. Retrieved July 1, 2022.
- Insikt Group. (2025, January 9). Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain. Retrieved January 14, 2025.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.