top of page

Ke3chang, Vixen Panda, APT 15, GREF, Playful Dragon

Mitre

Alias

Metushy, Bronze Palace, Nylon Typhoon, Backdoordiplomacy, Playful Dragon, Ctg-9246, Playful Taurus, G0004, Bronze Idlewood, Vixen Panda, Nickel, Operation �ke3chang�, Red Vulture, Operation �miragefox�, Apt 15, Bronze Davenport, Lurid, Gref, Ke3chang, Social Network Team, Apt15, Royal Apt

Country

China

Sponsor

China. State-sponsored, State-sponsored

Motivation

Information Theft And Espionage

First Seen

2010

Description

Ke3chang is a threat group attributed to actors operating out of China. Ke3chang has targeted several industries, including oil, government, military, and more.

Targeted
Industries

Government, Aerospace, Defense, Embassies, Uyghur Communities, Energy, Chemical, Mining, Oil And Gas, High-tech, Manufacturing, Telecommunications, Aviation, Industrial, Utilities

Targeted
Countries

Bhutan, Saudi Arabia, Slovakia, Mali, Panama, European Union, Italy, Turkey, Czech, France, Bosnia And Herzegovina, El Salvador, Hungary, Kazakhstan, Libya, Pakistan, Peru, Poland, Switzerland, Venezuela, Albania, United Kingdom, China, Malaysia, Sri Lanka, Bulgaria, Dominican Republic, Germany, Ghana, Chile, Namibia, Syria, Brazil, Guatemala, Trinidad And Tobago, Nigeria, Uae, Montenegro, Usa, Barbados, Ecuador, Afghanistan, Iran, Uk, India, Belgium, Egypt, Mexico, Croatia, Kuwait, Uzbekistan, Honduras, Argentina, Colombia, South Africa, Jamaica, Georgia, Indonesia, Portugal

Tools

Bs2005
Tidepool
Mimikatz
Cobalt
Spywaller
Eternalblue
Ms Exchange Tool
Living
Darthpusher
Portqry
Winnti
Irafau
Turian
Xslcmd
Highnoon
Cobalt Strike
Goldeneagle
Netcat
Eternalrocks And Eternalsynergy
Ms
Royaldns
Ketrican
Living Off The Land
Royalcli
Sinowal
Spwebmember
Carbonsteal
Henbox
Ketrum
Miragefox
Pluginphantom
Procdump
Okrum
Earthworm
Nbtscan
Pslist
Doubleagent
Silkbean
Smbtouch

TTP

T1133
T1003
T1087.001
T1569
T1543.003
T1003.004
T1036
T1003.001
T1003.002
T1041
T1071.004
T1614
T1083
T1558
T1587.001
T1057
T1082
T1560
T1021
T1016
T1033
T1027
T1071
T1003.003
T1588
T1105
T1059.003
T1087.002
T1190
T1114.002
T1087
T1071.001
T1543
T1558.001
T1140
T1059
T1069
T1056.001
T1213
T1547
T1036.002
T1547.001
T1078
T1069.002
T1020
T1005
T1021.002
T1056
T1614.001
T1587
T1114
T1007
T1049
T1078.004
T1213.002
T1588.002
T1569.002
T1018
T1560.001
T1119
T1036.005

Operations
Performed

[2010] operation �ke3chang� (as The Crisis In Syria Escalates, Fireeye Research-ers Have Discovered A Cyber Espionage Campaign, Which We Call �ke3chang,� That Falsely Advertises Information Updates About The Ongoing Crisis To Compromise Mfa Networks In Europe. We Believe That The Ke3chang Attackers Are Operating Out Of China And Have Been Active Since At Least 2010. However, We Believe Specific Syria-themed Attacks Against Mfas (codenamed By Ke3chang As �moviestar�) Began Only In August 2013. The Timing Of The Attacks Precedes A G20 Meeting Held In Russia That Focused On The Crisis In Syria. (https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-ke3chang.pdf)

[2014-08] forced To Adapt: Xslcmd Backdoor Now On Os X (https://www.fireeye.com/blog/threat-research/2014/09/forced-to-adapt-xslcmd-backdoor-now-on-os-x.html)

[2015] the Lookout Threat Intelligence Team Has Discovered Four Android Surveillanceware Tools, Which Are Used To Target The Uyghur Ethnic Minority Group. Our Research Indicates That These Four Interconnected Malware Tools Are Elements Of Much Larger Mapt (mobile Advanced Persistent Threat) Campaigns That Have Been Active For Years. Although There Is Evidence That The Campaigns Have Been Active Since At Least 2013, Lookout Researchers Have Been Monitoring The Surveillanceware Families � Silkbean, Doubleagent, Carbonsteal And Goldeneagle � As Far Back As 2015. (https://www.lookout.com/documents/threat-reports/us/lookout-uyghur-malware-tr-us.pdf)

[2016-05] little Has Been Published On The Threat Actors Responsible For Operation Ke3chang Since The Report Was Released More Than Two Years Ago. However, Unit 42 Has Recently Discovered The Actors Have Continued To Evolve Their Custom Malware Arsenal. We�ve Discovered A New Malware Family We�ve Named Tidepool. It Has Strong Behavioral Ties To Ke3chang And Is Being Used In An Ongoing Attack Campaign Against Indian Embassy Personnel Worldwide. This Targeting Is Also Consistent With Previous Attacker Ttps; Ke3chang Historically Targeted The Ministry Of Affairs, And Also Conducted Several Prior Campaigns Against India. (https://unit42.paloaltonetworks.com/operation-ke3chang-resurfaces-with-new-tidepool-malware/)

[2017-05] attack On A Company That Provides A Range Of Services To Uk Government (a Number Of Sensitive Documents Were Stolen By The Attackers During The Incident And We Believe Apt15 Was Targeting Information Related To Uk Government Departments And Military Technology. (during Our Analysis Of The Compromise, We Identified New Backdoors That Now Appear To Be Part Of Apt15�s Toolset. The Backdoor Bs2005 � Which Has Traditionally Been Used By The Group � Now Appears Alongside The Additional Backdoors Royalcli And Royaldns. (https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/march/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/)

[2017] backdoordiplomacy: Upgrading From Quarian To Turian (https://www.welivesecurity.com/2021/06/10/backdoordiplomacy-upgrading-quarian-turian/)

[2018-06] operation �miragefox� (the Malware Involved In This Recent Campaign, Miragefox, Looks To Be An Upgraded Version Of A Tool, A Rat Believed To Originate In 2012, Known As Mirage. (https://www.intezer.com/miragefox-apt15-resurfaces-with-new-tools-based-on-old-ones/)

[2019-03] the Group Continues To Be Active In 2019 � In March 2019, We Detected A New Ketrican Sample That Has Evolved From The 2018 Ketrican Backdoor. It Attacked The Same Targets As The Backdoor From 2018. (https://www.welivesecurity.com/2019/07/18/okrum-ke3chang-targets-diplomatic-missions/)

[2019-09] nickel Targeting Government Organizations Across Latin America And Europe (https://www.microsoft.com/security/blog/2021/12/06/nickel-targeting-government-organizations-across-latin-america-and-europe/)

[2020-05] in Mid May, We Identified Three Recently Uploaded Samples From Virustotal That Share Code With Older Apt15 Implants. We Named This New Family Of Samples, �ketrum�, Due To The Merger Of Features In The Documented Backdoor Families �ketrican� And �okrum�. (https://www.intezer.com/blog/research/the-evolution-of-apt15s-codebase-2020/)

[2021-08] backdoordiplomacy Wields New Tools In Fresh Middle East Campaign (https://www.bitdefender.com/blog/labs/backdoor-diplomacy-wields-new-tools-in-fresh-middle-east-campaign/)

[2022-04] chinese Playful Taurus Activity In Iran (https://unit42.paloaltonetworks.com/playful-taurus/

Counter
Operations

Nil

Information

bottom of page