ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > Velvet Ant

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Velvet Ant

NamesVelvet Ant (Sygnia)
CountryChina China
MotivationInformation theft and espionage
First seen2023
Description(Sygnia) Velvet Ant is a sophisticated and innovative threat actor. The investigation confirmed the threat actor maintained a prolonged presence in the organization’s on–premises network for about three years. The overall goal behind this campaign was to maintain access to the target network for espionage.
The threat actor achieved remarkable persistence by establishing and maintaining multiple footholds within the victim company’s environment. One of the mechanisms utilized for persistence was a legacy F5 BIG-IP appliance, which was exposed to the internet and which the threat actor leveraged as an internal Command and Control (C&C).
After one foothold was discovered and remediated, the threat actor swiftly pivoted to another, demonstrating agility and adaptability in evading detection.
The threat actor exploited various entry points across the victim’s network infrastructure, indicating a comprehensive understanding of the target’s environment.
ObservedCountries: East Asia.
Tools usedEarthWorm, ESRDE, PlugX, ShadowPad Winnti, VELVETSTING, VELVETTAP.
Operations performedJul 2024China-Nexus Threat Group ‘Velvet Ant’ Exploits Cisco Zero-Day (CVE-2024-20399) to Compromise Nexus Switch Devices – Advisory for Mitigation and Response
<https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/>
<https://www.sygnia.co/blog/china-threat-group-velvet-ant-cisco-zero-day/>
Information<https://www.sygnia.co/blog/china-nexus-threat-group-velvet-ant/>

Last change to this card: 27 August 2024

Download this actor card in PDF or JSON format

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]