top of page
Mitre
Alias
Chamelgang
Country
[unknown]
Sponsor
Nil
Motivation
Information Theft And Espionage
First Seen
2021
Description
(Positive Technologies) In Q2 2021, the PT Expert Security Center incident response team conducted an investigation in an energy company. The investigation revealed that the company's network had been compromised by an unknown group for the purpose of data theft. We gave the group the name ChamelGang (from the word 'chameleon'), because the group disguised its malware and network infrastructure under legitimate services of Microsoft, TrendMicro, McAfee, IBM, and Google. The attackers employed two methods. They acquired domains that imitate legitimate ones. In addition, the APT group placed SSL certificates that also imitated legitimate ones on its servers. To achieve their goal, the attackers used a trending penetration method�supply chain. The group compromised a subsidiary and penetrated the target company's network through it.
Targeted
Industries
Aviation, Government, Energy
Targeted
Countries
Usa, Russia, Nepal, Afghanistan, Lithuania, Japan, Turkey, Vietnam, Taiwan, Us, India
Tools
Frp
Tiny Shell
Tiny
7-zip
Cobalt
Doorme
Proxyt
Beaconloader
Cobalt Strike
TTP
Nil
Operations
Performed
Nil
Counter
Operations
Nil
Information
bottom of page