Names Bronze Highland (SecureWorks) Evasive Panda (Malwarebytes) Daggerfly (Symantec) Storm Cloud (Volexity) StormBamboo (Volexity) TAG-102 (Recorded Future) TAG-112 (Recorded Future) Country China China Sponsor State-sponsored Motivation Information theft and espionage First seen 2012 Description (SecureWorks) BRONZE HIGHLAND has been observed using spearphishing as an initial infection vector to deploy the MgBot remote access trojan against targets in Hong Kong. Third party reporting suggests the threat group also targets India, Malaysia and Taiwan and leverages Cobalt Strike and KsRemote Android Rat. CTU researchers assess with moderate confidence that BRONZE HIGHLAND operates on behalf of China and has a remit covering espionage against domestic human rights and pro-democracy advocates and nations neighbouring China. Observed Sectors: Telecommunications and human rights and pro-democracy advocates. Countries: China, Hong Kong, India, Macao, Malaysia, Myanmar, Nigeria, Philippines, Taiwan, Tibet, Vietnam and Africa. Tools used CloudScout, Cobalt Strike, GIMMICK, Nightdoor, Macma, MgBot, KsRemote, RELOADEXT, Living off the Land. Operations performed 2020 Evasive Panda APT group delivers malware via updates for popular Chinese software Late 2021 Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS 2022 CloudScout: Evasive Panda scouting cloud services Nov 2022 Daggerfly: APT Actor Targets Telecoms Company in Africa Mid 2023 StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms Sep 2023 Evasive Panda leverages Monlam Festival to target Tibetans May 2024 China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike Jul 2024 Daggerfly: Espionage Group Makes Major Update to Toolset Information Last change to this card: 26 December 2024