IronHusky
Description
(Kaspersky) IronHusky is a Chinese-speaking actor that we first detected in summer 2017. It is very focused on tracking the geopolitical agenda of targets in central Asia with a special focus in Mongolia, which seems to be an unusual target. This actor crafts campaigns for upcoming events of interest. In this case, they prepared and launched one right before a meeting with the International Monetary Fund and the Mongolian government at the end of January 2018. At the same time, they stopped their previous operations targeting Russian military contractors, which speaks volumes about the group’s limitations. In this new campaign, they exploited CVE-2017-11882 to spread common RATs typically used by Chinese-speaking groups, such as PlugX and PoisonIvy.
Names
Name | Name-Giver |
---|---|
IronHusky | Kaspersky |
BBCY-TA1 | BlackBerry |
Country
Motivation
- Information theft and espionage
First Seen
2017
Observed Sectors
Observed Countries
Tools
Operations
- 2021-08: Operation “MysterySnail” In late August and early September 2021, Kaspersky technologies detected attacks with the use of an elevation of privilege exploit on multiple Microsoft Windows servers. https://securelist.com/mysterysnail-attacks-with-windows-zero-day/104509/
Information
- https://securelist.com/apt-trends-report-q1-2018/85280/
- https://securelist.com/mysterysnail-new-version/116226/
Other Information
Uuid
3f1b347c-02ab-4ea5-ab79-6195bb15daf4
Last Card Change
2025-04-21