APT 17, Deputy Dog, Elderwood, Sneaky Panda

Description

(Symantec) In 2009, Google was attacked by a group using the Hydraq (Aurora) Trojan horse. Symantec has monitored this group’s activities for the last three years as they have consistently targeted a number of industries. Interesting highlights in their method of operations include: the use of seemingly an unlimited number of zero-day exploits, attacks on supply chain manufacturers who service the target organization, and a shift to “watering hole” attacks (compromising certain websites likely to be visited by the target organization). The targeted industry sectors include, but are not restricted to; defense, various defense supply chain manufacturers, human rights and non-governmental organizations (NGOs), and IT service providers. These attackers are systematic and re-use components of an infrastructure we have termed the “Elderwood platform”. The name “Elderwood” comes from a source code variable used by the attackers. This attack platform enables them to quickly deploy zero-day exploits. Attacks are deployed through spear phishing emails and also, increasingly, through Web injections in watering hole attacks.

It is likely the attackers have gained access to the source code for some widely used applications, or have thoroughly reverse-engineered the compiled applications in order to discover these vulnerabilities. The vulnerabilities are used as needed, often within close succession of each other if exposure of any of the vulnerabilities is imminent. The scale of the attacks, in terms of the number of victims and the duration of the attacks, are another indication of the resources available to the attackers. Victims are attacked, not for petty crime or theft, but for the wholesale gathering of intelligence and intellectual property. The resources required to identify and acquire useful information—let alone analyze that information—could only be provided by a large criminal organization, attackers supported by a nation state, or a nation state itself.

This group appears to be closely associated with Hidden Lynx, Aurora Panda and has infrastructure overlap with RedAlpha.

Could also be related to Axiom, Group 72.

Names

NameName-Giver
APT 17Mandiant
Tailgater TeamSymantec
ElderwoodSymantec
Elderwood GangSymantec
Sneaky PandaCrowdStrike
SIG22NSA
Beijing GroupSecureWorks
Bronze KeystoneSecureWorks
TG-8153SecureWorks
TEMP.AvengersFireEye
DogfishiDefense
Deputy DogiDefense
ATK 2Thales

Country

State-sponsored, Jinan bureau of the Chinese Ministry of State Security

Motivation

  • Information theft and espionage

First Seen

2009

Observed Sectors

Observed Countries

Tools

Operations

Information

Mitre Attack

Other Information

Uuid

58f101e3-5fe8-43d4-8d92-f09987604385

Last Card Change

2024-08-26