Carderbee

Description

(Symantec) A previously unknown advanced persistent threat (APT) group used the legitimate Cobra DocGuard software to carry out a supply chain attack with the goal of deploying the Korplug backdoor (aka PlugX) onto victim computers.

In the course of this attack, the attackers used malware signed with a legitimate Microsoft certificate. Most of the victims in this campaign are based in Hong Kong, with some victims based in other regions of Asia.

Korplug is known to be used by multiple APT groups, but we could not link this activity to a known threat actor so we have given the actor behind this activity a new name — Carderbee.

Names

NameName-Giver
CarderbeeSymantec

Country

Motivation

  • Information theft and espionage

First Seen

2023

Observed Countries

Tools

Information

Other Information

Uuid

15acd737-0ced-4e06-a285-42e1390d5452

Last Card Change

2023-09-06