Daggerfly

Threat Actor updated 19 days ago (2024-11-29T13:46:17.538Z)
Download STIX
Preview STIX
DaggerFly, also known as Evasive Panda and StormBamboo, is a Chinese-speaking Advanced Persistent Threat (APT) group that has been active since at least 2012. The group is recognized for its cyber espionage activities against individuals and organizations in mainland China, Hong Kong, Macao, Nigeria, and other regions opposing China's interests. DaggerFly, along with several other Chinese intrusion sets such as APT41, Mustang Panda, Tonto Team, and Dark Pink, have increasingly employed a technique known as DLL side-loading to load their malware onto targeted machines. From November 2022 to April 2023, DaggerFly conducted a significant cyber espionage campaign against an African telecommunications organization. This campaign was similar to the SoftCell campaign led by Gallium (aka Alloy Taurus), which targeted telecommunication entities in the Middle East. In 2023, Symantec identified a new intrusion by DaggerFly at an African telecom operator, where the threat actor used new plugins from its custom MgBot malware framework. DaggerFly's decade-long activity and persistent use of the MgBot framework highlight its sustained threat to global cybersecurity. In August 2024, Volexity researchers reported that DaggerFly successfully compromised an undisclosed internet service provider (ISP). The group used this breach to poison DNS responses for target organizations, demonstrating a sophisticated approach to exploiting software vendor update mechanisms. This method of attack aligns with DaggerFly's broader strategy of targeting ISPs as launchpads for their operations, further emphasizing the need for robust security measures across all levels of digital infrastructure.
Description last updated: 2024-11-11T14:46:54.520Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Bronze Highland is a possible alias for Daggerfly. Bronze Highland, also known as Evasive Panda and Daggerfly, is a China-linked Advanced Persistent Threat (APT) group that has been active since at least 2012. The group primarily conducts cyber espionage against individuals in mainland China, Hong Kong, Macao, and Nigeria, as well as certain organiz
5
Evasive Panda is a possible alias for Daggerfly. Evasive Panda, also known as StormBamboo, Daggerfly, or Bronze Highland, is a threat actor group linked to China that has been operating since at least 2012. The group primarily focuses on cyber espionage against civil society targets and has demonstrated significant technical capabilities. They hav
5
APT41 is a possible alias for Daggerfly. APT41, also known as Winnti, is a threat actor suspected to be originating from China, with its activities dating back to as early as 2012. It has targeted organizations in at least 14 countries and has been associated with the use of at least 46 different code families and tools. The group's activi
2
Stormbamboo is a possible alias for Daggerfly. StormBamboo, also known as Evasive Panda, Daggerfly, or Bronze Highland, is a threat actor group linked to China and has been operational since at least 2012. The group's primary objective is cyberespionage against entities opposing China's interests, including independence movements such as those i
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Apt
Malware
Backdoor
Evasive
Macos
Symantec
DNS
Android
Windows
Espionage
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Mgbot Malware is associated with Daggerfly. MgBot is a malicious software (malware) discovered by ESET, designed to exploit and damage computer systems. It can infiltrate systems via suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it's capable of stealing personal information, disrupting operations, and Unspecified
4
The MacMa Malware is associated with Daggerfly. Macma is a malware, first detailed by Google in 2021, that has been used since at least 2019. It is a modular backdoor that supports multiple functionalities such as device fingerprinting, executing commands, screen capture, keylogging, audio capture, and uploading and downloading files. Macma, ofteUnspecified
3
The Nightdoor Malware is associated with Daggerfly. Nightdoor is a sophisticated malware developed by the threat group Evasive Panda. This malicious software, designed to exploit and damage computer systems, was first detected in 2022 alongside MgBot, another custom implant developed by the same group. The primary function of Nightdoor is to infiltraUnspecified
2
Source Document References
Information about the Daggerfly Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securityaffairs
a month ago
ESET
2 months ago
DARKReading
2 months ago
Securityaffairs
3 months ago
DARKReading
4 months ago
Securityaffairs
4 months ago
Securityaffairs
5 months ago
DARKReading
5 months ago
InfoSecurity-magazine
5 months ago
BankInfoSecurity
5 months ago
CERT-EU
9 months ago
CERT-EU
9 months ago
CERT-EU
9 months ago
CERT-EU
9 months ago
InfoSecurity-magazine
9 months ago
CERT-EU
9 months ago
DARKReading
9 months ago
DARKReading
2 years ago
InfoSecurity-magazine
a year ago
CERT-EU
a year ago