Barium

Description

(Microsoft) Barium begins its attacks by cultivating relationships with potential victims—particularly those working in Business Development or Human Resources—on various social media platforms. Once Barium has established rapport, they spear-phish the victim using a variety of unsophisticated malware installation vectors, including malicious shortcut (.lnk) files with hidden payloads, compiled HTML help (.chm) files, or Microsoft Office documents containing macros or exploits. Initial intrusion stages feature the Win32/Barlaiy implant—notable for its use of social network profiles, collaborative document editing sites, and blogs for C&C. Later stages of the intrusions rely upon Winnti for persistent access. The majority of victims recorded to date have been in electronic gaming, multimedia, and Internet content industries, although occasional intrusions against technology companies have occurred.

Also see APT 41 and RedGolf, which overlap with Barium.

Names

NameName-Giver
BariumMicrosoft
PigfishiDefense
Brass TyphoonMicrosoft
Starchy TaurusPalo Alto

Country

State-sponsored

Motivation

  • Information theft and espionage

First Seen

2016

Observed Sectors

Tools

Counter Operations

Information

Other Information

Uuid

9fdef7ae-928b-4e3b-941c-bc36926ac0bd

Last Card Change

2025-06-27