Budworm

Threat Actor Profile Updated 3 months ago
Download STIX
Preview STIX
Budworm, also known as LuckyMouse or APT 27, is a threat actor that has been associated with various high-profile cyber attacks. This group has been found to utilize tools such as the Korplug backdoor, which is commonly used by multiple Advanced Persistent Threats (APTs) including Budworm and APT41, typically in cyber espionage attacks. The group's activities have raised concerns in the cybersecurity industry due to their involvement in software supply chain attacks, posing significant threats to organizations across sectors. Notably, Budworm was implicated in the 2022 attack on a gambling company, using the same technique they had previously employed in September 2021. Budworm's operations are not confined to one sector or region; they have targeted a Middle Eastern telecom organization, an Asian government, and even a U.S. state legislature. Their toolset continues to evolve, as demonstrated by the deployment of a previously unseen variant of its SysUpdate backdoor (SysUpdate DLL inicore_v2.3.30.dll). Additionally, they have been linked to the use of HyperBro loader, a tool associated with state-backed groups, leading Dutch cybersecurity firm EclecticIQ to attribute their campaign to China. There remain unanswered questions about Budworm's activities, particularly concerning their potential links to other actors such as Carderbee. The motives behind their attacks are also unclear, although the use of tools like PlugX/Korplug suggests a focus on cyber espionage. In recent times, Symantec's Threat Hunter Team discovered Budworm targeting a Middle Eastern telecommunications organization and an Asian government using an updated version of one of its key tools. Given these developments, it is evident that Budworm continues to be an active and evolving threat in the realm of cybersecurity.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
APT27
2
APT27, also known as Iron Taurus, is a Chinese threat actor group that primarily engages in cyber operations with the goal of intellectual property theft. The group targets multiple organizations worldwide, including those in North and South America, Europe, and the Middle East. APT27 utilizes vario
LuckyMouse
2
LuckyMouse, also known as Budworm, Emissary Panda, and APT27, is a threat actor that has been involved in several high-profile cyber-espionage activities. The group has demonstrated its ability to develop and deploy advanced cyber tools, targeting various operating systems including MacOS, Linux, an
Emissary Panda
2
Emissary Panda, also known as Iron Tiger, APT27, Budworm, Bronze Union, Lucky Mouse, and Red Phoenix, is a threat actor group associated with malicious cyber activities. The group has been active since at least 2013, targeting various industry verticals across Europe, North and South America, Africa
APT41
1
APT41, also known as Winnti, Wicked Panda, and Wicked Spider, is a sophisticated threat actor attributed to China. This group has been active since at least 2012, targeting organizations across 14 countries. The group is known for its extensive use of various code families and tools, with at least 4
Aquatic Panda
1
Aquatic Panda, also known as Budworm, Charcoal Typhoon, ControlX, RedHotel, and Bronze University, is a significant threat actor suspected of state-backed cyber espionage activities. This group has been particularly active in the recent quarter, ranking amongst the top geopolitical groups targeting
Lucky Mouse
1
Lucky Mouse, also known as Emissary Panda, APT27, Threat Group 3390, Bronze Union, and several other names, is a malicious software (malware) attributed to a China-linked Advanced Persistent Threat (APT) group. This malware has been active since at least 2013, targeting various industry verticals fo
Red Phoenix
1
Red Phoenix, also known as Budworm, APT27, Emissary Panda, Bronze Union, Lucky Mouse, and Iron Tiger, is a notorious malware that has been active since at least 2013. It is associated with a Chinese advanced persistent threat (APT) operation, targeting various industry verticals for intelligence gat
HyperBro
1
HyperBro is a malicious software (malware) that has been utilized in a sophisticated cyber espionage campaign targeting semiconductor industries primarily in Taiwan, Hong Kong, and Singapore. This malware was discovered being used in conjunction with a lure purporting to be from the Taiwan Semicondu
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Apt
Backdoor
Symantec
Espionage
Malware
Loader
Windows
Moveit
Curl
Tool
Gbhackers
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
SysUpdateUnspecified
2
SysUpdate is a malicious software variant that has been exclusively used by Budworm, also known as APT27, Emissary Panda, Bronze Union, Lucky Mouse, Iron Tiger, and Red Phoenix. In December 2020, a sample of the SysUpdate malware variant was found, with its payload being a new version of SysUpdate.
inicore_v2.3.30.dllUnspecified
2
The malware inicore_v2.3.30.dll is a harmful program designed to exploit and damage computer systems, often infiltrating them via suspicious downloads, emails, or websites without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for
Cobra DocguardUnspecified
1
Cobra DocGuard, a software produced by Chinese firm EsafeNet for protecting, encrypting, and decrypting software, has been exploited in a series of malware attacks. The attackers compromised the software's update files to deliver malicious updates that infected targeted systems. The first known inst
KorplugUnspecified
1
Korplug, also known as PlugX, is a type of malware developed and utilized by the China-aligned Advanced Persistent Threat (APT) group, Mustang Panda. This malicious software is designed to infiltrate computer systems without detection, often through suspicious downloads, emails, or websites. Once in
Plugx/korplugUnspecified
1
PlugX/Korplug is a malicious software (malware) known for its stealthy infiltration and damaging capabilities. It can infect systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal information, disrupt operations, or even hold data
CobraUnspecified
1
Cobra is a type of malware, short for malicious software, designed to exploit and damage computer systems or devices. It can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, Cobra has the potential to steal personal information, disrup
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
BRONZE UNIONUnspecified
1
Bronze Union, also known as APT27, Emissary Panda, Lucky Mouse, Iron Tiger, and Red Phoenix, is a threat actor with alleged connections to the Chinese government. The group has been observed targeting organizations across Europe, North and South America, Africa, the Middle East, and the Asia-Pacific
CarderbeeUnspecified
1
Carderbee, a previously unknown Advanced Persistent Threat (APT) group, has been identified as the perpetrator behind a series of supply chain attacks against organizations in Hong Kong and other regions in Asia. The Symantec Threat Hunter Team reported that Carderbee used a malware-infused version
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Korplug/plugxUnspecified
1
None
Source Document References
Information about the Budworm Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
DARKReading
5 months ago
iSoon's Secret APT Status Exposes China's Foreign Hacking Machination
InfoSecurity-magazine
10 months ago
Curl Releases Fixes For High-Severity Vulnerability
CERT-EU
10 months ago
China-based spies are hacking East Asian semiconductor companies, report says | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
10 months ago
Budworm: APT Group Uses Updated Custom Tool in Attacks on Government and Telecoms Org - Cyber Security Review
Checkpoint
10 months ago
2nd October – Threat Intelligence Report - Check Point Research
CERT-EU
10 months ago
Budworm APT Attacking Telecoms Org With New Custom Tools
CERT-EU
10 months ago
DDoS attack hits Russian flight booking system claimed by Ukrainian hackers
CERT-EU
10 months ago
Asian government, telco targeted by Chinese APT
CERT-EU
10 months ago
Cyber Security Week in Review: September 29, 2023
InfoSecurity-magazine
10 months ago
Budworm APT Evolves Toolset, Targets Telecoms and Government
CERT-EU
10 months ago
China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies
CERT-EU
10 months ago
Budworm hackers target telcos and govt orgs with custom malware
CERT-EU
a year ago
Carderbee Hacking Group Uses Legitimate Software in Supply Chain Attack
CERT-EU
a year ago
Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong
CERT-EU
a year ago
Previously unknown hacking group targets Hong Kong organizations in supply chain cyberattack
CERT-EU
a year ago
Chinese APT Targets Hong Kong in Supply Chain Attack
CERT-EU
a year ago
New ‘Carderbee’ APT Targeted Chinese Security Software in Supply Chain Attack
CERT-EU
a year ago
Leftover Links 27/08/2023: Windows TCO Stories and Linux Foundation 'Masters'
CERT-EU
a year ago
Novel Carderbee supply chain attack impacts Asian organizations