RedAlpha

Description

The original research from Citizen Lab did not give this group a name.

(Recorded Future) Recorded Future’s Insikt Group has identified two new cyberespionage campaigns targeting the Tibetan community over the past two years. The campaigns, which we are collectively naming RedAlpha, combine light reconnaissance, selective targeting, and diverse malicious tooling. We discovered this activity as the result of pivoting off of a new malware sample observed targeting the Tibetan community based in India.

Insikt Group’s analysis of infrastructure overlap among the new campaigns reveals wider targeting of the Chinese “Five Poisons,” in addition to South and Southeast Asian governments. Based on the campaign’s targeting of “Five Poisons”-related organizations, overlapping infrastructure, and links to malware used by other Chinese APTs uncovered during our research, we assess with medium confidence that the RedAlpha campaigns were conducted by a Chinese APT.

Infrastructure overlaps have been found with APT 17, Deputy Dog, Elderwood, Sneaky Panda, Icefog, Dagger Panda and NetTraveler, APT 21, Hammer Panda.

Names

NameName-Giver
RedAlphaRecorded Future
DeepCliff?
Red Dev 3PWC

Country

State-sponsored, possibly PLA and/or Nanjing Qinglan Information Technology Co. Ltd

Motivation

  • Information theft and espionage

First Seen

2015

Observed Sectors

Observed Countries

Tools

Operations

Information

Other Information

Uuid

e049d10f-81fd-4cc0-bb61-46f75594a1b9

Last Card Change

2024-03-10