Luckycat

Threat Actor updated 5 months ago (2024-05-04T20:46:06.904Z)
Download STIX
Preview STIX
LuckyCat, also known as TA413, is a threat actor with a history of malicious cyber activities. This group has been consistently targeting Tibetan entities, including individuals, organizations, and the exiled Tibetan government. Its activities have been linked to the use of ExileRAT and LuckyCat Android malware, with its infrastructure and email sender domains reported in public cybersecurity literature. The group's activities have shown significant overlaps with other threat actors, demonstrating a complex web of shared resources and tactics. In December 2018, LuckyCat executed a campaign targeting the Tibetan community using an email address historically associated with TA413 activity. This campaign also demonstrated overlaps with the command and control (C2) infrastructure of the domain peopleoffreeworld[.]tk, which was previously noted in a Cisco Talos LuckyCat campaign. The infection chain used in this campaign loaded a custom backdoor known as TClient, a tactic seen in past activities attributed to another threat group called Tropic Trooper. Both TA413 and Tropic Trooper-associated activities utilized the URI string /qqqzqa, further highlighting their interconnected operations. By 2022, LuckyCat's persistent targeting of Tibetan entities continued unabated. The group's techniques were found to be used by other threat groups such as DriftingCloud and Ragnarok ransomware family. Furthermore, at least four named threat actors, including Fancy Bear, Wizard Spider, Luckycat, and UAC-0098, are known to have used similar tactics, techniques, and procedures (TTPs), indicating a broader landscape of threat actors sharing resources and strategies for their malicious campaigns.
Description last updated: 2023-11-29T04:44:37.351Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Ta413 is a possible alias for Luckycat. TA413, also known as LuckyCat, is a threat actor suspected of conducting cyber espionage on behalf of the Chinese state. In the first half of 2022, TA413 targeted Tibetan individuals, organizations, and the exiled Tibetan government. The group exploited a now-patched zero-day vulnerability in the So
3
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Luckycat Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more