ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > Operation Tainted Love

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Operation Tainted Love

NamesOperation Tainted Love (SentinelLabs)
CountryChina China
MotivationInformation theft and espionage
First seen2023
Description(SentinelLabs) In Q1 of 2023, SentinelLabs observed initial phases of attacks against telecommunication providers in the Middle East.

We assess that this activity represents an evolution of tooling associated with Operation Soft Cell.

While it is highly likely that the threat actor is a Chinese cyberespionage group in the nexus of Gallium and APT 41, the exact grouping remains unclear.

SentinelLabs observed the use of a well-maintained, versioned credential theft capability and a new dropper mechanism indicative of an ongoing development effort by a highly-motivated threat actor with specific tasking requirements.
ObservedSectors: Telecommunications.
Countries: Middle East.
Tools usedmim221, Mimikatz.
Information<https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/>

Last change to this card: 27 December 2024

Download this actor card in PDF or JSON format

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]