SYMBOLCOMMON_NAMEaka. SYNONYMS

HURRICANE PANDA  (Back to overview)


We have investigated their intrusions since 2013 and have been battling them nonstop over the last year at several large telecommunications and technology companies. The determination of this China-based adversary is truly impressive: they are like a dog with a bone. HURRICANE PANDA's preferred initial vector of compromise and persistence is a China Chopper webshell – a tiny and easily obfuscated 70 byte text file that consists of an ‘eval()’ command, which is then used to provide full command execution and file upload/download capabilities to the attackers. This script is typically uploaded to a web server via a SQL injection or WebDAV vulnerability, which is often trivial to uncover in a company with a large external web presence. Once inside, the adversary immediately moves on to execution of a credential theft tool such as Mimikatz (repacked to avoid AV detection). If they are lucky to have caught an administrator who might be logged into that web server at the time, they will have gained domain administrator credentials and can now roam your network at will via ‘net use’ and ‘wmic’ commands executed through the webshell terminal.


Associated Families

There are currently no families associated with this actor.


References
2019-02-06Recorded FutureInsikt Group, Rapid7
APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign
Trochilus RAT APT31 HURRICANE PANDA
2018-03-05ConfiantJerome Dangu
Zirconium was one step ahead of Chrome’s redirect blocker with 0-day
HURRICANE PANDA
2018-01-23ConfiantJerome Dangu
Uncovering 2017’s Largest Malvertising Operation
HURRICANE PANDA
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-04-13CrowdStrikeDmitri Alperovitch
Cyber Deterrence in Action? A story of one long HURRICANE PANDA campaign
HURRICANE PANDA
2015-01-26CrowdStrikeAndy Schworer, Josh Liburdi
Storm Chasing: Hunting Hurricane Panda
HURRICANE PANDA
2014-10-14CrowdStrikeDmitri Alperovitch
CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda
HURRICANE PANDA

Credits: MISP Project