Names CeranaKeeper (ESET) Country China China Sponsor State-sponsored Motivation Information theft and espionage First seen 2022 Description (ESET) CeranaKeeper has been active since at least the beginning of 2022, mainly targeting governmental entities in Asian countries such as Thailand, Myanmar, the Philippines, Japan, and Taiwan; we believe it is aligned with China’s interests. The group’s relentless hunt for data is remarkable, with its attackers deploying a wide array of tools aimed at extracting as much information as possible from compromised networks. In the operation we analyzed, the group turned compromised machines into update servers, devised a novel technique using GitHub’s pull request and issue comment features to create a stealthy reverse shell, and deployed single-use harvesting components when collecting entire file trees. CeranaKeeper seems to reuse tools from Mustang Panda, Bronze President. Observed Sectors: Government. Countries: Japan, Myanmar, Philippines, Taiwan, Thailand. Tools used PUBLOAD, TONEINS, TONESHELL. Operations performed 2023 Separating the bee from the panda: CeranaKeeper making a beeline for Thailand Information Last change to this card: 24 October 2024