RedHotel, TAG-22
Description
(Recorded Future) Recorded Future has identified a suspected Chinese state-sponsored group that we track as Threat Activity Group 22 (TAG-22) targeting telecommunications, academia, research and development, and government organizations in Nepal, the Philippines, Taiwan, and more historically, Hong Kong. In this most recent activity, the group likely used compromised GlassFish servers and Cobalt Strike in initial access operations before switching to the bespoke Winnti, ShadowPad, and Spyder backdoors for long-term access using dedicated actor-provisioned command and control infrastructure.
Also see Earth Lusca.
Names
Name | Name-Giver |
---|---|
RedHotel | Recorded Future |
TAG-22 | Recorded Future |
Fishmonger | ESET |
Country
Sponsor
State-sponsored, I-Soon
Motivation
- Information theft and espionage
First Seen
2021
Observed Sectors
Observed Countries
- Afghanistan
- Bangladesh
- Bhutan
- Cambodia
- Czech
- Hong Kong
- India
- Laos
- Malaysia
- Nepal
- Pakistan
- Philippines
- Taiwan
- Thailand
- USA
- Vietnam
- Palestine
Tools
Operations
- 2021-07: BIOPASS RAT: New Malware Sniffs Victims via Live Streaming< https://www.trendmicro.com/en_us/research/21/g/biopass-rat-new-malware-sniffs-victims-via-live-streaming.html
- 2022: Operation “FishMedley” https://www.welivesecurity.com/en/eset-research/operation-fishmedley/
Information
- https://www.recordedfuture.com/chinese-group-tag-22-targets-nepal-philippines-taiwan/
- https://go.recordedfuture.com/hubfs/reports/cta-2023-0808.pdf
- https://www.sentinelone.com/labs/unmasking-i-soon-the-leak-that-revealed-chinas-cyber-operations/
Other Information
Uuid
4de6af3d-8242-44c6-80eb-9eee83a62823
Last Card Change
2025-04-21