ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Nightdoor

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Nightdoor

NamesNightdoor
NetMM
Suzafk
CategoryMalware
TypeBackdoor
Description(ESET) The backdoor that we have named Nightdoor (and is named NetMM by the malware authors according to PDB paths) is a late addition to Evasive Panda’s toolset. Our earliest knowledge of Nightdoor goes back to 2020, when Evasive Panda deployed it onto a machine of a high-profile target in Vietnam. The backdoor communicates with its C&C server via UDP or the Google Drive API. The Nightdoor implant from this campaign used the latter. It encrypts a Google API OAuth 2.0 token within the data section and uses the token to access the attacker’s Google Drive. We have requested that the Google account associated with this token be taken down.
Information<https://www.welivesecurity.com/en/eset-research/evasive-panda-leverages-monlam-festival-target-tibetans/>
<https://symantec-enterprise-blogs.security.com/threat-intelligence/daggerfly-espionage-updated-toolset>

Last change to this tool card: 27 August 2024

Download this tool card in JSON format

All groups using tool Nightdoor

ChangedNameCountryObserved

APT groups

 Bronze HighlandChina2012-Jul 2024 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]