ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Ke3chang, Vixen Panda, APT 15, GREF, Playful Dragon

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Ke3chang, Vixen Panda, APT 15, GREF, Playful Dragon

NamesKe3chang (FireEye)
Vixen Panda (CrowdStrike)
APT 15 (Mandiant)
GREF (SecureWorks)
Bronze Palace (SecureWorks)
Bronze Davenport (SecureWorks)
Bronze Idlewood (SecureWorks)
CTG-9246 (SecureWorks)
Playful Dragon (FireEye)
Royal APT (NCC Group)
Nickel (Microsoft)
BackdoorDiplomacy (ESET)
Playful Taurus (Palo Alto)
Metushy (?)
Social Network Team (?)
Nylon Typhoon (Microsoft)
Flea (Symantec)
Red Vulture (PWC)
CountryChina China
MotivationInformation theft and espionage
First seen2010
DescriptionKe3chang is a threat group attributed to actors operating out of China. Ke3chang has targeted several industries, including oil, government, military, and more.
ObservedSectors: Aerospace, Aviation, Chemical, Defense, Embassies, Energy, Government, High-Tech, Industrial, Manufacturing, Mining, Oil and gas, Telecommunications, Utilities and Uyghur communities.
Countries: Afghanistan, Albania, Argentina, Barbados, Belgium, Bhutan, Bosnia and Herzegovina, Brazil, Bulgaria, Chile, China, Colombia, Croatia, Czech, Dominican Republic, Ecuador, Egypt, El Salvador, France, Georgia, Germany, Ghana, Guatemala, Honduras, Hungary, India, Indonesia, Iran, Italy, Jamaica, Kazakhstan, Kuwait, Libya, Malaysia, Mali, Mexico, Montenegro, Namibia, Nigeria, Pakistan, Panama, Peru, Poland, Portugal, Saudi Arabia, Slovakia, South Africa, Sri Lanka, Switzerland, Syria, Trinidad and Tobago, Turkey, UAE, UK, USA, Uzbekistan, Venezuela.
Tools usedBS2005, CarbonSteal, Cobalt Strike, DarthPusher, EarthWorm, EternalBlue, DoubleAgent, GoldenEagle, Graphican, HenBox, HighNoon, IRAFAU, Ketrican, Ketrum, Mimikatz, MirageFox, MS Exchange Tool, nbtscan, netcat, Okrum, PluginPhantom, PortQry, ProcDump, PsList, RoyalCli, RoyalDNS, SilkBean, Sinowal, SMBTouch, spwebmember, SpyWaller, TidePool, Turian, Winnti, XSLCmd, Living off the Land and EternalRocks and EternalSynergy.
Operations performed2010Operation “Ke3chang”
As the crisis in Syria escalates, FireEye research-ers have discovered a cyber espionage campaign, which we call “Ke3chang,” that falsely advertises information updates about the ongoing crisis to compromise MFA networks in Europe. We believe that the Ke3chang attackers are operating out of China and have been active since at least 2010. However, we believe specific Syria-themed attacks against MFAs (codenamed by Ke3chang as “moviestar”) began only in August 2013. The timing of the attacks precedes a G20 meeting held in Russia that focused on the crisis in Syria.
Aug 2014Forced to Adapt: XSLCmd Backdoor Now on OS X
2015The Lookout Threat Intelligence team has discovered four Android surveillanceware tools, which are used to target the Uyghur ethnic minority group. Our research indicates that these four interconnected malware tools are elements of much larger mAPT (mobile advanced persistent threat) campaigns that have been active for years. Although there is evidence that the campaigns have been active since at least 2013, Lookout researchers have been monitoring the surveillanceware families — SilkBean, DoubleAgent, CarbonSteal and GoldenEagle — as far back as 2015.
May 2016Little has been published on the threat actors responsible for Operation Ke3chang since the report was released more than two years ago. However, Unit 42 has recently discovered the actors have continued to evolve their custom malware arsenal. We’ve discovered a new malware family we’ve named TidePool. It has strong behavioral ties to Ke3chang and is being used in an ongoing attack campaign against Indian embassy personnel worldwide. This targeting is also consistent with previous attacker TTPs; Ke3chang historically targeted the Ministry of Affairs, and also conducted several prior campaigns against India.
May 2017Attack on a company that provides a range of services to UK Government
A number of sensitive documents were stolen by the attackers during the incident and we believe APT15 was targeting information related to UK government departments and military technology.
During our analysis of the compromise, we identified new backdoors that now appear to be part of APT15’s toolset. The backdoor BS2005 – which has traditionally been used by the group – now appears alongside the additional backdoors RoyalCli and RoyalDNS.
2017BackdoorDiplomacy: Upgrading from Quarian to Turian
Jun 2018Operation “MirageFox”
The malware involved in this recent campaign, MirageFox, looks to be an upgraded version of a tool, a RAT believed to originate in 2012, known as Mirage.
Mar 2019The group continues to be active in 2019 – in March 2019, we detected a new Ketrican sample that has evolved from the 2018 Ketrican backdoor. It attacked the same targets as the backdoor from 2018.
Sep 2019NICKEL targeting government organizations across Latin America and Europe
May 2020In mid May, we identified three recently uploaded samples from VirusTotal that share code with older APT15 implants. We named this new family of samples, “Ketrum”, due to the merger of features in the documented backdoor families “Ketrican” and “Okrum”.
Aug 2021BackdoorDiplomacy Wields New Tools in Fresh Middle East Campaign
Apr 2022Chinese Playful Taurus Activity in Iran
Late 2022Graphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministries

Last change to this card: 10 March 2024

Download this actor card in PDF or JSON format

Previous: Karkadann
Next: Kimsuky, Velvet Chollima

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]