top of page

ChamelGang

Mitre

Alias

Chamelgang

Country

[unknown]

Sponsor

Nil

Motivation

Information Theft And Espionage

First Seen

2021

Description

(Positive Technologies) In Q2 2021, the PT Expert Security Center incident response team conducted an investigation in an energy company. The investigation revealed that the company's network had been compromised by an unknown group for the purpose of data theft. We gave the group the name ChamelGang (from the word 'chameleon'), because the group disguised its malware and network infrastructure under legitimate services of Microsoft, TrendMicro, McAfee, IBM, and Google. The attackers employed two methods. They acquired domains that imitate legitimate ones. In addition, the APT group placed SSL certificates that also imitated legitimate ones on its servers. To achieve their goal, the attackers used a trending penetration method�supply chain. The group compromised a subsidiary and penetrated the target company's network through it.

Targeted
Industries

Aviation, Government, Energy

Targeted
Countries

Usa, Russia, Nepal, Afghanistan, Lithuania, Japan, Turkey, Vietnam, Taiwan, Us, India

Tools

Frp
Tiny Shell
Tiny
7-zip
Cobalt
Doorme
Proxyt
Beaconloader
Cobalt Strike

TTP

Nil

Operations
Performed

Nil

Counter
Operations

Nil

Information

bottom of page