ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Turbine Panda, APT 26, Shell Crew, WebMasters, KungFu Kittens

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Turbine Panda, APT 26, Shell Crew, WebMasters, KungFu Kittens

NamesTurbine Panda (CrowdStrike)
APT 26 (Mandiant)
Shell Crew (RSA)
WebMasters (Kaspersky)
KungFu Kittens (FireEye)
Group 13 (Talos)
PinkPanther (RSA)
Black Vine (Symantec)
Bronze Express (SecureWorks)
JerseyMikes (?)
CountryChina China
SponsorState-sponsored, the Jiangsu Bureau of the MSS (JSSD/江苏省国家安全厅)
MotivationInformation theft and espionage, Financial crime
First seen2010
Description(RSA) During recent engagements, the RSA IR Team has responded to multiple incidents involving a common adversary targeting each client’s infrastructure and assets. The RSA IR Team is referring to this threat group internally as “Shell_Crew”; however, they are also referred to as Deep Panda, WebMasters, KungFu Kittens, SportsFans, and PinkPanther amongst the security community.

Some analysts track Turbine Panda, DarkHydrus, LazyMeerkat and APT 19, Deep Panda, C0d0so0 as the same group, but it is unclear from open source information if the groups are the same.
Turbine Panda has some overlap with Emissary Panda, APT 27, LuckyMouse, Bronze Union.
ObservedSectors: Aerospace, Aviation, Defense, Energy, Financial, Food and Agriculture, Government, Healthcare, Non-profit organizations, Telecommunications, Think Tanks.
Countries: Australia, Canada, China, Denmark, France, Germany, India, Italy, UK, USA and Southeast Asia.
Tools usedCobalt Strike, Derusbi, FormerFirstRAT, Hurix, Mivast, PlugX, Sakula RAT, StreamEx, Winnti, Living off the Land.
Operations performedDec 2012Attack and IE 0day Information Used Against Council on Foreign Relations
Regarding information’s posted on the Washington Free Beacon, infected website was used to attack visitors in order to extract valuable information’s. The “drive-by” attack was detected around 2:00 pm on Wednesday 26 December and CFR members who visited the website between Wednesday and Thursday could have been infected and their data compromised, the specialists said.
Dec 2012Capstone Turbine Corporation Also Targeted in the CFR Watering Hole Attack
May 2015StreamEx malware
Cylance SPEAR has identified a newer family of samples deployed by Shell Crew that has flown under AV’s radar for more than a year and a half. Simple programmatic techniques continue to be effective in evading signature-based detection.
Counter operationsOct 2018Chinese Intelligence Officers and Their Recruited Hackers and Insiders Conspired to Steal Sensitive Commercial Aviation and Technological Data for Years

Last change to this card: 06 November 2021

Download this actor card in PDF or JSON format

Previous: Tropic Trooper, Pirate Panda, APT 23, KeyBoy
Next: Turla, Waterbug, Venomous Bear

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]