Ke3chang

Threat Actor updated 4 months ago (2024-05-04T19:19:04.802Z)
Download STIX
Preview STIX
Ke3chang, also known as APT15, Mirage, Vixen Panda GREF, and Playful Dragon, is a prominent threat actor that has been active since at least 2010. According to the European Union Agency for Cybersecurity (ENISA), this group has consistently targeted energy, government, and military sectors. Ke3chang is linked to various arms of China’s People’s Liberation Army or government, along with other groups such as APT27, APT30, APT31, GALLIUM, and Mustang Panda. Notably, between March 2022 and early 2023, Ke3chang targeted a government finance department in the Americas. Ke3chang's activities have evolved over time, with recent developments including the creation of Graphican's backdoor, an evolution of its signature Ketrican malware. This toolset, while associated with APT15 by Symantec, is linked to Ke3chang by Sekoia.io analysts and ESET, indicating a possible overlap in the operations of these threat actors. Other threat actors have also demonstrated similar patterns of targeting financial institutions and organizations financing infrastructure projects, such as Tropic Trooper targeting Taiwanese financial institutions, Witchetty targeting an African stock exchange, and Gallium targeting an organization financing urban infrastructure development projects in Nepal. The group's tactics, techniques, and procedures (TTPs) have been closely studied and emulated in real-world testing scenarios, underscoring their sophistication and effectiveness. For example, SE Labs replicated the TTPs of Ke3chang, among others, in their testing. Moreover, researchers at Eset attributed campaigns to a threat group tracked as Gref, which overlaps with activity also ascribed to groups including APT15, Vixen Panda, and Ke3chang. In another instance, the Chinese state-sponsored operation Flea, also known as APT15 and Ke3chang, leveraged a novel Graphican backdoor in attacks against foreign affairs ministries across the Americas between late 2022 and early 2023.
Description last updated: 2024-05-04T18:50:03.217Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
APT15
2
APT15, also known as Vixen Panda, Nickel, Flea, KE3CHANG, Royal APT, and Playful Dragon, is a threat actor group suspected to be of Chinese origin. The group targets global sectors including trade, economic and financial, energy, and military, aligning with the interests of the Chinese government. I
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Apt
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
KetricanUnspecified
2
Ketrican is a type of malware, or malicious software, that was developed to exploit and damage computer systems. It's associated with the Ke3chang group and is known for its ability to infiltrate systems through suspicious downloads, emails, or websites. Once inside a system, Ketrican can steal pers
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
Mustang PandaUnspecified
4
Mustang Panda, also known by various aliases such as Bronze President, Luminous Moth, and Camaro Dragon among others, is a threat actor believed to operate from Chengdu, China. The group has been publicly linked to APT41 and other Chinese groups such as the Tonto Team. Known for its rapid attacks an
APT27Unspecified
2
APT27, also known as Iron Taurus, is a threat actor group suspected to be attributed to China. Engaging in cyber operations with the primary goal of intellectual property theft, APT27 targets organizations globally, with a focus on North and South America, Europe, and the Middle East. The group's mo
APT30Unspecified
2
APT30, a threat actor suspected to be attributed to China, has been active since at least 2005. This group primarily targets members of the Association of Southeast Asian Nations (ASEAN). APT30 is notable for its sustained activity over an extended period and its ability to adapt and modify source c
APT31Unspecified
2
APT31, also known as Zirconium, is a threat actor group linked to the Chinese government that has been implicated in numerous cyber espionage activities. One of their most notable exploits was the cloning of the Equation Group's exploit, EpMe (CVE-2017-0005). This exploit was initially discovered du
GALLIUMUnspecified
2
Gallium, also known as Alloy Taurus, is a China-aligned threat actor known for executing actions with malicious intent in the cyber domain. In recent years, Gallium has been associated with various significant cyber-espionage campaigns. The group targeted telecommunication entities in the Middle Eas
Source Document References
Information about the Ke3chang Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago
APT15 is Alive and Strong: An Analysis of RoyalCli and RoyalDNS
CERT-EU
a year ago
Multiple Chinese APTs are attacking European targets, EU cyber agency warns | #ukscams | #datingscams | #european | #datingscams | #love | #relationships | #scams | #pof | #match.com | #dating | National Cyber Security Consulting
CERT-EU
a year ago
My Tea's not cold : an overview of China's cyber threat – Global Security Mag Online
BankInfoSecurity
a year ago
Chinese APT Uses Fake Messenger Apps to Spy on Android Users
CrowdStrike
a year ago
CrowdStrike Scores 100% in SE Labs 2023 Q2 EAS Test | CrowdStrike
CERT-EU
a year ago
Stay informed with threat reports
CERT-EU
a year ago
Novel Graphican backdoor leveraged in Chinese APT attacks against foreign ministries
CERT-EU
a year ago
Flea APT’s latest campaign targets foreign affairs ministries with new Graphican backdoor
MITRE
2 years ago
Operation “Ke3chang”: Targeted attacks against ministries of foreign affairs | Mandiant
Unit42
2 years ago
Chinese Playful Taurus Activity in Iran
CERT-EU
2 years ago
EU Organizations Warned of Chinese APT Attacks
Securityaffairs
2 years ago
ENISA and CERT-EU warns Chinese APTs targeting EU organizations
CERT-EU
a year ago
Europa vermehrt im Visier chinesischer und russischer Ausspähversuche | ZDNet.de
DARKReading
a year ago
ESET APT Report: Attacks by China-, North Korea-, and Iran-aligned Threat Actors; Russia Eyes Ukraine and the EU
ESET
a year ago
ESET APT Activity Report Q4 2022­–Q1 2023 | WeLiveSecurity