Aquatic Panda

Threat Actor updated 4 months ago (2024-05-04T20:25:03.570Z)
Download STIX
Preview STIX
Aquatic Panda, also known as Budworm, Charcoal Typhoon, ControlX, RedHotel, and Bronze University, is a significant threat actor suspected of state-backed cyber espionage activities. This group has been particularly active in the recent quarter, ranking amongst the top geopolitical groups targeting users of the Netskope Security Cloud platform. Additionally, evidence of suspected Log4j exploits was found in their possession, indicating the use of sophisticated attack techniques. Aquatic Panda is associated with China, alongside another threat actor known as Maverick Panda. Notably, Aquatic Panda has been observed leveraging advanced capabilities provided by OpenAI, including open-source research, identifying potential targets, code creation and resolution of coding errors, vulnerability research, and translation of foreign technical papers. This indicates a high level of sophistication and adaptability, suggesting that the group is well-resourced and poses a significant cybersecurity threat. The group's activities align with those of other major threat actors such as APT 28 (Russia), Kimusky (North Korea), and Imperial Kitten (Iran), each utilizing advanced AI capabilities to enhance their operations. The activities of Aquatic Panda have raised concerns within the cybersecurity industry. Adam Meyers, head of counter adversary operations at CrowdStrike, specifically identified the group as a primary source of concern. However, it should be noted that Aquatic Panda is not the only threat actor exploiting ransomware; other active criminal adversary groups such as TA505 and FIN7 are also heavily reliant on ransomware, creating additional challenges for cybersecurity defenses worldwide.
Description last updated: 2024-03-05T21:43:50.923Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Aquatic Panda Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
7 months ago
iSoon's Secret APT Status Exposes China's Foreign Hacking Machination | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
DARKReading
7 months ago
iSoon's Secret APT Status Exposes China's Foreign Hacking Machination
CERT-EU
7 months ago
Global AI Developers Need to Set Some Standards – Now
DARKReading
7 months ago
Microsoft, OpenAI: Nation-States Are Weaponizing AI in Cyberattacks
BankInfoSecurity
7 months ago
OpenAI and Microsoft Terminate State-Backed Hacker Accounts
CERT-EU
9 months ago
CyberTalk with Ray Canzanese
CERT-EU
a year ago
Netskope Threat Labs report says highest percentage of cybercrime activity originates in Russia
CERT-EU
a year ago
Criminal groups focus on Australia and US
MITRE
2 years ago
AQUATIC PANDA in Possession of Log4Shell Exploit Tools | CrowdStrike