ShadowPad

Malware updated a day ago (2024-09-07T01:17:45.753Z)
Download STIX
Preview STIX
ShadowPad is a modular malware that has been utilized by various Chinese threat actors since at least 2017. It's a malicious software designed to infiltrate computer systems, often without the user's knowledge, and can cause significant damage by stealing personal information, disrupting operations, or holding data for ransom. ShadowPad is typically delivered through suspicious downloads, emails, or websites, and once inside a system, it can deploy other harmful activities. This malware was notably used as the payload in a supply chain attack targeting South Asian governments, according to a VB2023 paper. The ShadowPad malware has been observed to have connections with other cyber threats. For instance, it was found that Winnti uses legitimate utilities to load DLLs from ShadowPad and PlugX. Furthermore, an examination of the Stately Taurus activity cluster revealed a connection with another cluster that used the ShadowPad backdoor in the same environment. The origins of Listeners.bat, a tool used in the Stately Taurus cluster, were traced back to the same network session that wrote additional files and malware, including the ShadowPad backdoor, indicating a potential link between the ShadowPad activity and the VSCode activity associated with Stately Taurus. ShadowPad's command-and-control (C2) servers have been identified, such as the one operated by the Tonto Team at lab.symantecsafe[.]org and another one with the IP address 216.83.40[.]84. These servers are crucial for the operation of the malware, allowing remote control over infected systems. In addition, ShadowPad infections have been detected in Cortex XDR, highlighting the broad reach of this malware. As one of the main tools used in these activity clusters, ShadowPad represents a significant threat to cybersecurity worldwide.
Description last updated: 2024-09-07T00:22:53.362Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
PlugX
9
PlugX is a notorious malware known for its harmful capabilities and stealthy operations. Often used by the Winnti group, it has been linked to various cyber-attacks, leveraging DLL side-loading to remain undetected. This technique allows it to infiltrate systems without raising alarms, making it an
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Backdoor
Apt
Espionage
Loader
Trojan
Rat
Payload
Linux
State Sponso...
Encryption
Exploit
Cobalt Strike
Symantec
Tool
Implant
Windows
Chinese
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
PoisonplugUnspecified
2
None
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
WinntiUnspecified
7
The Winnti Group is a sophisticated threat actor that has been active since at least 2007, first identified by Kaspersky in 2013. This collective of Chinese nation-state hackers is known for its advanced cyberespionage capabilities and its unique strategy of targeting legitimate software supply chai
APT41Unspecified
6
APT41, a threat actor attributed to China, has been actively targeting organizations in at least 14 countries since 2012. The group is known for its use of an extensive range of malware, with at least 46 different code families and tools observed in their operations. They are associated with various
RedflyUnspecified
5
RedFly, a threat actor group known for its malicious activities, has emerged as a significant cybersecurity concern. The group's operations are characterized by their strategic execution and targeted focus, often resulting in substantial security breaches. Threat actors like RedFly pose a significan
Winnti GroupUnspecified
2
The Winnti Group, a collective of Chinese Advanced Persistent Threat (APT) groups including APT41, first gained notoriety for its attacks on computer game developers. The group was initially spotted by Kaspersky in 2013, but researchers suggest that this nation-state actor has been active since at l
Bronze UniversityUnspecified
2
Bronze University, also known as Aquatic Panda, ControlX, RedHotel, and Earth Lusca, is a threat actor group believed to be a Chinese state-sponsored hacking operation. The group has been active since 2021, targeting government, aerospace, education, telecommunications, media, and research organizat
LanceflyUnspecified
2
Lancefly, a threat actor potentially associated with China, has been identified as the group behind an ongoing cyberespionage campaign targeting organizations in South and Southeast Asia. The targets include government bodies, aviation companies, educational institutions, and telecommunication secto
Earth LuscaUnspecified
2
Earth Lusca, a threat actor identified as being Chinese-speaking, has been active since at least the first half of 2023. The group primarily targets organizations in Southeast Asia, Central Asia, and the Balkans. Recently, it has expanded its arsenal with SprySOCKS Linux malware, a new addition that
I-SoonUnspecified
2
i-SOON, a threat actor believed to be operating out of China, has come into the limelight due to a significant data leak. The leaked documents provide an inside view of i-SOON's operations, revealing its role in executing cyberespionage campaigns on behalf of various Chinese government agencies. Thi
RedhotelUnspecified
2
RedHotel is a prolific threat actor group, known for its espionage activities targeting organizations of interest to the Chinese government. The group has been active since at least 2019 and operates alongside other threat groups such as RedAlpha and Poison Carp. Researchers at Recorded Future have
Source Document References
Information about the ShadowPad Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Unit42
a day ago
Chinese APT Abuses VSCode to Target Government in Asia
Securityaffairs
a month ago
Security Affairs newsletter Round 484 by Pierluigi Paganini – INTERNATIONAL EDITION
Securityaffairs
a month ago
CISA adds Microsoft COM for Windows bug to its Known Exploited Vulnerabilities catalog
Checkpoint
a month ago
5th August – Threat Intelligence Report - Check Point Research
Securityaffairs
a month ago
China-linked APT41 breached Taiwanese research institute
DARKReading
a month ago
China's APT41 Targets Taiwan Research Institute for Cyber Espionage
BankInfoSecurity
3 months ago
Researchers Uncover Chinese Hacking Cyberespionage Campaign
BankInfoSecurity
5 months ago
iSoon Leak Shows Links to Chinese APT Groups
DARKReading
6 months ago
Chinese APT 'Earth Krahang' Compromises 48 Gov't Orgs on 5 Continents
Trend Micro
6 months ago
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks
CERT-EU
6 months ago
Anxun and Chinese APT Activity - ReliaQuest
CERT-EU
6 months ago
i-SOON Data Leak: Key Points
Trend Micro
6 months ago
Earth Lusca Uses Geopolitical Lure to Target Taiwan Before Elections
CERT-EU
6 months ago
A Mysterious Leak Exposed Chinese Hacking Secrets | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Unit42
6 months ago
Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns
CERT-EU
7 months ago
Leaked documents show how firm supports Chinese hacking operations
Securelist
9 months ago
Kaspersky malware report for Q3 2023
CERT-EU
10 months ago
Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers
CERT-EU
a year ago
Virus Bulletin :: Teasing the secrets from threat actors: malware configuration extractors
CERT-EU
a year ago
Multiple Chinese APTs are attacking European targets, EU cyber agency warns | #ukscams | #datingscams | #european | #datingscams | #love | #relationships | #scams | #pof | #match.com | #dating | National Cyber Security Consulting