APT41, Double Dragon


Description

APT41, also known as Double Dragon, is a sophisticated Chinese cyber threat group that has gained notoriety for its dual engagement in state-sponsored espionage and financially motivated cybercrime operations. Here are some key points about APT41:

Origins and Activities

APT41 is believed to have been active since at least 2012. The group is allegedly tied to the Chinese Ministry of State Security (MSS) and is classified as an advanced persistent threat (APT). Their activities align with China's national strategies and goals, particularly in technology development.


Dual Nature of Operations

The name "Double Dragon" stems from the group's unique dual focus:

  1. State-sponsored espionage: Targeting government agencies and private companies worldwide.

  2. Financial gain: Conducting cybercrime operations, often focused on the video game industry.

This combination of espionage and individual financial gain is unusual among Chinese state-sponsored threat groups.


Targets and Scope

APT41 has targeted organizations in at least 14 countries, including:

  • United States

  • United Kingdom

  • France

  • India

  • Japan

  • Singapore

  • South Korea

  • Thailand

The group has infiltrated various sectors, including:

  • Healthcare

  • Telecommunications

  • Technology

  • Video game industry

  • Public sector

  • Manufacturing

  • Logistics

  • Education

  • Media

  • Aviation


Notable Attacks and Techniques

  • Compromised TeamViewer AG in 2016, gaining access to systems of TeamViewer users worldwide.

  • Launched phishing scams in India in 2021, stealing data related to tax legislation and COVID-19 records.

  • Exploited vulnerabilities in internet-facing technologies like Pulse Secure, Apache, F5 Big-IP, and Microsoft products.

  • Utilized a custom UEFI firmware implant called MoonBounce for targeted attacks.

  • Employed SQL injections and Cobalt Strike beacons in their 2021 campaigns.

Legal Actions

In September 2020, the U.S. Department of Justice announced charges against five Chinese and two Malaysian nationals believed to be members of APT41. They were accused of compromising over 100 companies worldwide.


Malware and Tools

APT41 has developed and utilized various malware tools, including:

  • WyrmSpy and DragonEgg (mobile spyware)

  • Custom Cobalt Strike beacons

  • Non-public malware typically reserved for espionage campaigns

The group is known for its sophisticated tactics, techniques, and procedures (TTPs), including the ability to pivot between Windows and Linux systems and conduct supply chain attacks.

Previous
Previous

Mirai Botnet

Next
Next

Evilginx 2