Earth Longzhi

Threat Actor updated 19 days ago (2024-11-29T14:20:54.105Z)
Download STIX
Preview STIX
Earth Longzhi, a suspected subgroup of the notorious APT41, has reemerged after months of inactivity and is now attacking organizations across various industries in Southeast Asia. This group had been on hiatus since its last campaign which ran from August 2021 to June 2022. Trend Micro's investigation revealed two distinct campaigns carried out by Earth Longzhi between 2020 and 2022. The group's current campaign targets organizations in government, healthcare, technology, and manufacturing sectors in the Philippines, Thailand, Taiwan, and Fiji - a country they've never targeted before. The group's modus operandi involves the use of DLL sideloading and Fastly CDN - tools popular with APT41 subgroups, to reduce the risk of exposure and detection. There are overlaps found between Earth Estries' backdoor loader and FamousSparrow's, indicating similar tactics or shared resources. Earth Longzhi also primarily delivers two types of malware according to Trend Micro: Croxloader, a loader for Cobalt Strike, and a new anti-detection tool called SPHijacker. Operation Crimson Palace involved tools and infrastructure that overlap with several known Chinese threat actors, including Worok and the APT41 subgroup Earth Longzhi. The group's evolving Tactics, Techniques, and Procedures (TTPs) show a preference for targeting public-facing Internet Information Services (IIS) and Microsoft Exchange servers as entry points to install the popular Behinder Web shell. This allows them to gather information and download further malware onto host systems. As Earth Longzhi continues to refine its stealth tactics in espionage campaigns, potential targets are advised to ensure their environment, especially those exposed to the internet, are fully patched and updated to mitigate the risk of attacks.
Description last updated: 2024-06-05T13:17:14.475Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Longzhi is a possible alias for Earth Longzhi. Earth Longzhi, a subgroup within the notorious APT41 cyber espionage group, has re-emerged after months of dormancy, according to cybersecurity researchers at Trend Micro. The threat actor has been known for its malicious activities since 2020 and has recently targeted organizations in Taiwan, Thail
3
APT41 is a possible alias for Earth Longzhi. APT41, also known as Winnti, is a threat actor suspected to be originating from China, with its activities dating back to as early as 2012. It has targeted organizations in at least 14 countries and has been associated with the use of at least 46 different code families and tools. The group's activi
3
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Espionage
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Earth Longzhi Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more