Earth Estries

Threat Actor updated 5 months ago (2024-05-04T17:59:56.005Z)
Download STIX
Preview STIX
Earth Estries is a cyberespionage group, or threat actor, that has targeted government entities and tech firms across the globe, including in the US, Germany, South Africa, Asia, Malaysia, the Philippines, and Taiwan. While the exact origin of Earth Estries remains unclear, there are indications suggesting possible links to China. The group's arsenal includes three unique malware tools: Zingdoor, TrillClient, and HemiGate - the latter being a backdoor tool. Their command and control (C&C) infrastructure relies on the Fastly CDN service, which was previously abused by threat actors related to the Chinese group APT41. The activities of Earth Estries have been widely reported, with notable coverage by Security Week and SC Magazine. A significant disclosure about their activities came to light on September 1, 2023, when it was revealed that they were involved in strategic intrusions targeting telecommunication, finance, and government sectors in Africa. This coincided with a parallel report from SentinelOne detailing similar activities by Chinese threat actors in Africa, as part of activity clusters dubbed BackdoorDiplomacy and Operation Tainted Love. Trend Micro, a cybersecurity firm, has noted overlaps in tactics, techniques, and procedures (TTPs) between Earth Estries and an advanced persistent threat (APT) group called FamousSparrow. FamousSparrow, which was active in 2021 and targeted governments and hotels, may be connected to the China-linked threat actors SparklingGoblin and DRBControl. These connections and overlaps suggest a potential wider network of threat actors with shared objectives and methods, further emphasizing the global security risks posed by groups like Earth Estries.
Description last updated: 2024-05-04T16:37:33.534Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
APT41 is a possible alias for Earth Estries. APT41, also known as Winnti, Wicked Panda, and Brass Typhoon, is a threat actor suspected to be linked to China. This group has been active since at least 2012 and has targeted organizations in over 14 countries. They have used a variety of sophisticated techniques and malware, including at least 46
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Espionage
Malware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Earth Estries Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more