APT41, Double Dragon
Description
APT41, also known as Double Dragon, is a sophisticated Chinese cyber threat group that has gained notoriety for its dual engagement in state-sponsored espionage and financially motivated cybercrime operations. Here are some key points about APT41:
Origins and Activities
APT41 is believed to have been active since at least 2012. The group is allegedly tied to the Chinese Ministry of State Security (MSS) and is classified as an advanced persistent threat (APT). Their activities align with China's national strategies and goals, particularly in technology development.
Dual Nature of Operations
The name "Double Dragon" stems from the group's unique dual focus:
State-sponsored espionage: Targeting government agencies and private companies worldwide.
Financial gain: Conducting cybercrime operations, often focused on the video game industry.
This combination of espionage and individual financial gain is unusual among Chinese state-sponsored threat groups.
Targets and Scope
APT41 has targeted organizations in at least 14 countries, including:
United States
United Kingdom
France
India
Japan
Singapore
South Korea
Thailand
The group has infiltrated various sectors, including:
Healthcare
Telecommunications
Technology
Video game industry
Public sector
Manufacturing
Logistics
Education
Media
Aviation
Notable Attacks and Techniques
Compromised TeamViewer AG in 2016, gaining access to systems of TeamViewer users worldwide.
Launched phishing scams in India in 2021, stealing data related to tax legislation and COVID-19 records.
Exploited vulnerabilities in internet-facing technologies like Pulse Secure, Apache, F5 Big-IP, and Microsoft products.
Utilized a custom UEFI firmware implant called MoonBounce for targeted attacks.
Employed SQL injections and Cobalt Strike beacons in their 2021 campaigns.
Legal Actions
In September 2020, the U.S. Department of Justice announced charges against five Chinese and two Malaysian nationals believed to be members of APT41. They were accused of compromising over 100 companies worldwide.
Malware and Tools
APT41 has developed and utilized various malware tools, including:
WyrmSpy and DragonEgg (mobile spyware)
Custom Cobalt Strike beacons
Non-public malware typically reserved for espionage campaigns
The group is known for its sophisticated tactics, techniques, and procedures (TTPs), including the ability to pivot between Windows and Linux systems and conduct supply chain attacks.