CardinalLizard

Description

(Kaspersky) We are moderately confident that this is a new collection of Chinese-speaking activity targeting businesses, active since 2014. Over the last few years, the group has shown an interest in the Philippines, Russia, Mongolia and Malaysia, the latter especially prevalent during 2018. The hackers use a custom malware featuring some interesting anti-detection and anti-emulation techniques. The infrastructure used also shows some overlaps with Roaming Tiger and previous PlugX campaigns, but this could just be due to infrastructure reuse under the Chinese-speaking umbrella.

Names

NameName-Giver
CardinalLizardKaspersky

Country

Motivation

  • Information theft and espionage

First Seen

2014

Observed Countries

Tools

Information

Other Information

Uuid

e69f77ea-849d-4497-9f87-ca96df6921e2

Last Card Change

2020-04-29