Goblin Panda, Cycldek, Conimes

Description

(CrowdStrike) CrowdStrike first observed Goblin Panda activity in September 2013 when indicators of its activity were discovered on the network of a technology company operating in multiple sectors.

Malware variants primarily used by this actor include PlugX and HttpTunnel. This actor focuses a significant amount of its targeting activity on entities in Southeast Asia, particularly Vietnam. Heavy activity was observed in the late spring and early summer of 2014 when tensions between China and other Southeast Asian nations were high, due to conflict over territory in the South China Sea. Goblin Panda targets have been primarily observed in the defense, energy, and government sectors.

Names

NameName-Giver
Goblin PandaCrowdStrike
CycldekKaspersky
ConimesAnomali
1937CN?

Country

Motivation

  • Information theft and espionage

First Seen

2013

Observed Sectors

Observed Countries

Tools

Operations

Information

Playbook

Other Information

Uuid

54b1fa22-3aa4-4cdd-9c24-e6f1ce0e907d

Last Card Change

2021-05-15