🇨🇳
Nomad Panda
APT Group
Information theft and espionage
6 zero-day CVEs
ETDA ✓
Also Known As
No alias recordedTarget Countries
No target country recorded
Sectors Targeted
No targeted sector recordedDetails
Origin
🇨🇳 CN
Last Updated
13 Apr 2026
MITRE ATT&CK 41
T001.001
T002
T1016 - System Network Configuration Discovery
T1027 - Obfuscated Files or Information
T1027.002 - Software Packing
T1036 - Masquerading
T1055 - Process Injection
T1056.001 - Keylogging
T1059.001
T1071 - Application Layer Protocol
T1082 - System Information Discovery
T1083 - File and Directory Discovery
T1087 - Account Discovery
T1095 - Non-Application Layer Protocol
T1112 - Modify Registry
T1140 - Deobfuscate/Decode Files or Information
T1189 - Drive-by Compromise
T1406 - Obfuscated Files or Information
T1409 - Access Stored Application Data
T1412 - Capture SMS Messages
T1413 - Access Sensitive Data in Device Logs
T1414 - Capture Clipboard Data
T1418 - Application Discovery
T1421 - System Network Connections Discovery
T1422 - System Network Configuration Discovery
T1424 - Process Discovery
T1426 - System Information Discovery
T1429 - Capture Audio
T1430 - Location Tracking
T1432 - Access Contact List
T1439 - Eavesdrop on Insecure Network Communication
T1447 - Delete Device Data
T1472 - Generate Fraudulent Advertising Revenue
T1507 - Network Information Discovery
T1518 - Software Discovery
T1523 - Evade Analysis Environment
T1555 - Credentials from Password Stores
T1555.003 - Credentials from Web Browsers
T1566 - Phishing
T1571 - Non-Standard Port
T1574 - Hijack Execution Flow