🇨🇳
Pirate Panda
APT Group
Information theft and espionage
13 zero-day CVEs
ETDA ✓
Also Known As 8 names
BRONZE HOBART
Earth Centaur
G0081
KeyBoy
APT23
Red Orthrus
Tropic Trooper
APT 23
Target Countries 7
Countries highlighted in red
Hong Kong
India
Malaysia
Philippines
Province of China Taiwan
United States
Vietnam
Sectors Targeted
Details
Origin
🇨🇳 CN
Last Updated
31 Oct 2024
Malware Families 3
ccleaner_backdoor
entryshell
win.shadow_rat
MITRE ATT&CK 131
T1003 - OS Credential Dumping
T1005
T1007
T1008 - Fallback Channels
T1011
T1012
T1016 - System Network Configuration Discovery
T1020
T1021 - Remote Services
T1027 - Obfuscated Files or Information
T1027.003
T1027.013
T1033 - System Owner/User Discovery
T1036 - Masquerading
T1036.005
T1041
T1046
T1047 - Windows Management Instrumentation
T1048
T1049
T1052
T1052.001
T1053
T1055 - Process Injection
T1055.001
T1056 - Input Capture
T1057 - Process Discovery
T1059 - Command and Scripting Interpreter
T1059.001 - PowerShell
T1059.003 - Windows Command Shell
T1059.007 - JavaScript
T1060
T1068 - Exploitation for Privilege Escalation
T1069 - Permission Groups Discovery
T1070
T1070.004
T1071
T1071.001 - Web Protocols
T1071.004
T1078
T1078.003
T1081
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1085
T1087
T1090 - Proxy
T1091
T1095
T1102 - Web Service
T1105 - Ingress Tool Transfer
T1106
T1110
T1112
T1113
T1114
T1114.001
T1115 - Clipboard Data
T1119
T1120
T1124
T1127
T1130
T1132
T1132.001
T1133
T1135 - Network Share Discovery
T1136
T1137
T1140 - Deobfuscate/Decode Files or Information
T1170
T1176 - Browser Extensions
T1189 - Drive-by Compromise
T1190
T1203
T1204 - User Execution
T1204.002
T1204.003 - Malicious Image
T1217
T1218 - Signed Binary Proxy Execution
T1221
T1482 - Domain Trust Discovery
T1485
T1486
T1489
T1490 - Inhibit System Recovery
T1496 - Resource Hijacking
T1497
T1497.003
T1498 - Network Denial of Service
T1503
T1505 - Server Software Component
T1505.003 - Web Shell
T1518
T1518.001 - Security Software Discovery
T1529
T1530
T1531 - Account Access Removal
T1533 - Data from Local System
T1539
T1543
T1543.003 - Windows Service
T1547
T1547.001 - Registry Run Keys / Startup Folder
T1547.004
T1550
T1552
T1553 - Subvert Trust Controls
T1555
T1560
T1561
T1562 - Impair Defenses
T1562.001
T1564
T1564.001
T1566 - Phishing
T1566.001
T1571
T1573
T1573.001 - Symmetric Cryptography
T1573.002
T1574 - Hijack Execution Flow
T1574.001 - DLL Search Order Hijacking
T1574.002
T1583
T1584.006 - Web Services
T1587
T1588.002 - Tool
T1589 - Gather Victim Identity Information
T1595
T1680