Operation Jacana

Description

(ESET) In February 2023, ESET researchers detected a spearphishing campaign targeting a governmental entity in Guyana. While we haven’t been able to link the campaign, which we named Operation Jacana, to any specific APT group, we believe with medium confidence that a China-aligned threat group is behind this incident.

In the attack, the operators used a previously undocumented C++ backdoor that can exfiltrate files, manipulate Windows registry keys, execute CMD commands, and more. We named the backdoor DinodasRAT based on the victim identifier it sends to its C&C: the string always begins with Din, which reminded us of the hobbit Dinodas from the Lord of the Rings.

Names

NameName-Giver
Operation JacanaESET

Country

Motivation

  • Information theft and espionage

First Seen

2023

Observed Countries

Tools

Information

Other Information

Uuid

321affd1-6d46-4886-9edd-9d2fe9705ff0

Last Card Change

2023-10-13