ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > ToddyCat

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: ToddyCat

NamesToddyCat (Kaspersky)
CountryChina China
MotivationInformation theft and espionage
First seen2020
Description(Kaspersky) ToddyCat is a relatively new APT actor that we have not been able to relate to other known actors, responsible for multiple sets of attacks detected since December 2020 against high-profile entities in Europe and Asia. We still have little information about this actor, but we know that its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’.
ObservedSectors: Defense, Government, Telecommunications.
Countries: Afghanistan, India, Indonesia, Iran, Kazakhstan, Kyrgyzstan, Malaysia, Pakistan, Russia, Slovakia, Taiwan, Thailand, UK, Uzbekistan, Vietnam.
Tools usedChina Chopper, Ninja, Samurai.
Operations performed2021Operation “Stayin’ Alive”
Unveiling ‘Stayin’ Alive’: A Closer Look at an Ongoing Campaign in Asia Targeting Telecom and Governmental Entities
<https://blog.checkpoint.com/security/unveiling-stayin-alive-a-closer-look-at-an-ongoing-campaign-in-asia-targeting-telecom-and-governmental-entities/>
Information<https://securelist.com/toddycat/106799/>
<https://securelist.com/toddycat-keep-calm-and-check-logs/110696/>

Last change to this card: 13 October 2023

Download this actor card in PDF or JSON format

Previous: Tiny Spider
Next: Tomiris

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]