Sandman

Description

(SentinelLabs) In collaboration with QGroup GmbH, SentinelLabs observed over August 2023 a threat activity cluster targeting the telecommunication sector. The activities have been conducted by a threat actor of unknown origin using a novel modular backdoor based on the LuaJIT platform. We dub this threat actor and the backdoor Sandman and LuaDream in reference to what we suspect to be the backdoor’s internal name – DreamLand client.

The activities we observed are characterized by strategic lateral movement to specific targeted workstations and minimal engagement, suggesting a deliberate approach aimed at achieving the set objectives while minimizing the risk of detection.

Names

NameName-Giver
SandmanSentinelLabs

Country

Motivation

  • Information theft and espionage

First Seen

2022

Observed Sectors

Observed Countries

Tools

Information

Other Information

Uuid

6e7a3b00-6ff8-414a-b6b3-040ddcfd4e8c

Last Card Change

2024-01-16