Passcv

Threat Actor updated 3 months ago (2024-11-29T13:31:12.985Z)
Download STIX
Preview STIX
PassCV is a threat actor, or hacking team, that has been identified as part of the Chinese intelligence apparatus. This group has operated under various names including Winnti, APT17, Axiom, LEAD, BARIUM, Wicked Panda, and GREF, indicating a broad and complex network of cyber operations. The group is known for its malicious activities, which typically involve the execution of actions with harmful intent. One particular method PassCV has employed is the use of malware linked to stolen code signing certificates, as was reported by cybersecurity firm Cylance in 2016. The PassCV group gained significant attention when it was discovered that one of the NetWire binaries they used was signed with a stolen certificate. This certificate was directly linked to the aforementioned Cylance report, providing further evidence of PassCV's involvement in these cyberattacks. The utilization of stolen certificates allows the group to infiltrate systems more seamlessly, as the malicious software appears legitimate and trustworthy to unsuspecting victims. More recently, researchers have identified PassCV among over two dozen different threat actors hosting command-and-control (C2) servers on Cloudzy infrastructure. These groups span multiple countries and include other Chinese actors like Operation Dragon Castling, APT10, and BlackTech/Circuit Panda, as well as actors from India, Iran, North Korea, Pakistan, Russia, Vietnam, Israel, and various cybercriminal groups. This discovery underscores the widespread reach and influence of PassCV within the global landscape of cyber threats.
Description last updated: 2024-05-05T00:53:17.250Z
What's your take? (Question 1 of 1)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
GREF is a possible alias for Passcv. GREF, a China-aligned Advanced Persistent Threat (APT) group, has been identified as the orchestrator of two active Android malware campaigns. The campaigns have been distributing a malicious software called BadBazaar via two applications, Signal Plus Messenger and FlyGram, through the Google Play s
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Apt
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Passcv Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more