Wicked Panda

Threat Actor updated a month ago (2024-10-17T12:02:44.574Z)
Download STIX
Preview STIX
Wicked Panda, also known as APT41, Double Dragon, and Brass Typhoon, is a prominent threat actor in the cybersecurity landscape. This China state-sponsored group has been identified as one of the top threat actors by the Department of Health and Human Services' Health Sector Cybersecurity Coordination Center. Over time, multiple subgroups have been identified as part of the APT41 collective, including Winnti, Suckfly, and Barium. These groups have been involved in extensive cyberespionage activities, compromising sensitive data from organizations in the US and several other countries. The Wicked Panda group has been associated with the use of sophisticated malware such as LightSpy for surveillance purposes, as reported by security researchers at ThreatFabric. The group has also been linked to the Shadowpad backdoor, discovered in 2017 following a supply-chain attack on server management software. Wicked Panda's tactics include using public cloud services for hosting malicious files and installing backdoors in targeted systems for cyberespionage. Recent attacks attributed to this group have targeted Taiwanese government agencies, Filipino and Japanese military, and energy companies in Vietnam. Despite its extensive activity, Wicked Panda appears not to be connected to other known advanced persistent threat (APT) groups. However, some analyses have found overlap between APT41 and other Chinese nation-state groups such as APT10 (Bronze Riverside, Potassium, or Stone Panda), APT27 (Bronze Union, Emissary Panda, or Lucky Mouse), indicating possible tactical similarities. Overall, Wicked Panda represents a significant threat to global cybersecurity, demonstrating advanced capabilities and a broad range of targets.
Description last updated: 2024-10-17T11:42:05.965Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
APT41 is a possible alias for Wicked Panda. APT41, also known as Winnti, is a threat actor suspected to be originating from China, with its activities dating back to as early as 2012. It has targeted organizations in at least 14 countries and has been associated with the use of at least 46 different code families and tools. The group's activi
4
Winnti is a possible alias for Wicked Panda. Winnti is a threat actor group known for its malicious activities, primarily originating from Chinese Advanced Persistent Threat (APT) operational infrastructure. The group, which has been active since at least 2007, was first spotted by Kaspersky in 2013. It is associated with several aliases such
2
Double Dragon is a possible alias for Wicked Panda. Double Dragon, also known as APT41, Winnti, or Barium, is a prominent Advanced Persistent Threat (APT) group believed to have originated from China. As a threat actor, Double Dragon represents a human entity with the intent to execute actions of a malicious nature. The group has been identified by t
2
Lightspy is a possible alias for Wicked Panda. LightSpy is a threat actor known for its sophisticated and malicious activities. It first gained attention in 2022 when it began deploying its namesake spyware, LightSpy, which has since evolved to possess extensive spying capabilities. The group has strategically enhanced its capabilities over time
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Espionage
Health
State Sponso...
Malware
Backdoor
Threatfabric
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Lazarus Group Threat Actor is associated with Wicked Panda. The Lazarus Group, a notorious North Korean state-sponsored threat actor, is among the most prolific and dangerous cyber threat actors in operation. The group has been involved in several high-profile cyber-attacks, including Operation DreamJob in Spain, with the primary objective of funding North KUnspecified
2
The Apt43 Threat Actor is associated with Wicked Panda. APT43, also known as Kimsuky, is a North Korean Advanced Persistent Threat (APT) group that has been active since at least 2013. The group is known for its intelligence collection activities and using cybercrime to fund espionage. It has been linked to several aliases including Springtail, ARCHIPELAUnspecified
2
The Emerald Sleet Threat Actor is associated with Wicked Panda. Emerald Sleet, a threat actor associated with North Korea, has been identified as a significant player in cyber espionage. This group is known for its sophisticated use of artificial intelligence and machine learning models (LLMs), leveraging them to enhance spear-phishing campaigns, research publicUnspecified
2
The Thallium Threat Actor is associated with Wicked Panda. Thallium, also known as Kimsuky, APT43, Velvet Chollima, and Black Banshee, is a significant threat actor that has been active since at least 2012. This group, believed to be operating on behalf of the North Korean regime, conducts intelligence collection and uses cybercrime to fund espionage activiUnspecified
2
Source Document References
Information about the Wicked Panda Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more