ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > RedHotel, TAG-22

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: RedHotel, TAG-22

NamesRedHotel (Recorded Future)
TAG-22 (Recorded Future)
Fishmonger (ESET)
CountryChina China
MotivationInformation theft and espionage
First seen2021
Description(Recorded Future) Recorded Future has identified a suspected Chinese state-sponsored group that we track as Threat Activity Group 22 (TAG-22) targeting telecommunications, academia, research and development, and government organizations in Nepal, the Philippines, Taiwan, and more historically, Hong Kong. In this most recent activity, the group likely used compromised GlassFish servers and Cobalt Strike in initial access operations before switching to the bespoke Winnti, ShadowPad, and Spyder backdoors for long-term access using dedicated actor-provisioned command and control infrastructure.

Also see Earth Lusca.
ObservedSectors: Aerospace, Education, Government, Media, Telecommunications.
Countries: Afghanistan, Bangladesh, Bhutan, Cambodia, Czech, Hong Kong, India, Laos, Malaysia, Nepal, Pakistan, Philippines, Taiwan, Thailand, USA, Vietnam and Palestine.
Tools usedBrute Ratel, Cobalt Strike, FunnySwitch, ShadowPad Winnti, Spyder, Winnti.

Last change to this card: 29 November 2023

Download this actor card in PDF or JSON format

Previous: RedGolf
Next: RevengeHotels

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]