Icefog, Dagger Panda

Icefog, Dagger Panda, ATK 23
(Type: -)

(Kaspersky) “Icefog” is an Advanced Persistent Threat that has been active since at least 2011, targeting mostly Japan and South Korea. Known targets include governmental institutions, military contractors, maritime and shipbuilding groups, telecom operators, industrial and high-tech companies and mass media. The name “Icefog” comes from a string used in the command-and-control server name in one of the samples. The command-and-control software is named “Dagger Three”, in the Chinese language. During Icefog attacks, several other malicious tools and backdoors were uploaded to the victims’ machines, for data exfiltration and lateral movement. The later group {{RedAlpha}} has infrastructure overlap with Icefog.

[News Analysis] Trends:

Total Trend: 6

Trend Per Year
1
2016
2
2019
1
2020
2
2021


Trend Per Month
1
Sep 2016
1
Jun 2019
1
Dec 2019
1
Jan 2020
1
Feb 2021
1
Jun 2021



[News Analysis] News Mention Another Threat Name:

30 - Icefog5 - PcShare7 - PlugX14 - Poison Ivy5 - QuickHeal5 - DAGGER PANDA2 - ShadowPad10 - BLACKCOFFEE10 - Cotx RAT10 - Datper10 - DDKONG10 - Derusbi10 - Korlia10 - NewCore RAT10 - PLAINTEE10 - Sisfader14 - Cerberus14 - TSCookie14 - Cobalt Strike14 - Dtrack14 - Emotet14 - Formbook14 - IcedID14 - IRONHALO14 - Loki Password Stealer (PWS)14 - PandaBanker14 - PLEAD14 - poisonplug14 - TrickBot14 - BlackTech2 - Sarhust


[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
0/45
initial access
0/19
execution
1/36
persistence
1/113
privilege escalation
1/96
defense evasion
0/184
credential access
0/63
discovery
0/44
lateral movement
0/22
collection
0/37
command and control
0/39
exfiltration
0/18
impact
0/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1053.002
Scheduled Task/job : At
T1053.002
Scheduled Task/job : At
T1053.002
Scheduled Task/job : At


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

Basic Information (Credit @etda.or.th)

Actor: Icefog, Dagger Panda

Names: Icefog, Dagger Panda, ATK 23

Country: China

Sponsor: State-sponsored

Motivation: Information theft and espionage

First-seen: 2011

Description: (Kaspersky) “Icefog” is an Advanced Persistent Threat that has been active since at least 2011, targeting mostly Japan and South Korea. Known targets include governmental institutions, military contractors, maritime and shipbuilding groups, telecom operators, industrial and high-tech companies and mass media. The name “Icefog” comes from a string used in the command-and-control server name in one of the samples. The command-and-control software is named “Dagger Three”, in the Chinese language. During Icefog attacks, several other malicious tools and backdoors were uploaded to the victims’ machines, for data exfiltration and lateral movement. The later group {{RedAlpha}} has infrastructure overlap with Icefog.

Observed-sectors: Aerospace

Observed-sectors: Defense

Observed-sectors: Government

Observed-sectors: High-Tech

Observed-sectors: Maritime and Shipbuilding

Observed-sectors: Media

Observed-sectors: Telecommunications

Observed-sectors: Utilities

Observed-sectors: others

Observed-countries: Australia

Observed-countries: Austria

Observed-countries: Belarus

Observed-countries: Canada

Observed-countries: China

Observed-countries: France

Observed-countries: Germany

Observed-countries: Hong Kong

Observed-countries: India

Observed-countries: Italy

Observed-countries: Japan

Observed-countries: Kazakhstan

Observed-countries: Malaysia

Observed-countries: Maldives

Observed-countries: Mongolia

Observed-countries: Netherlands

Observed-countries: Pakistan

Observed-countries: Philippines

Observed-countries: Russia

Observed-countries: Singapore

Observed-countries: South Korea

Observed-countries: Sri Lanka

Observed-countries: Taiwan

Observed-countries: Tajikistan

Observed-countries: Turkey

Observed-countries: UK

Observed-countries: USA

Observed-countries: Uzbekistan

Tools: 8.t Dropper

Tools: Dagger Three

Tools: Icefog

Tools: Javafog

Tools: ShadowPad Winnti

Operations: 2014-01

Operations: The Icefog APT Hits US Targets With Java Backdoor Since the publication of our report, the Icefog attackers went completely dark, shutting down all known command-and-control servers. Nevertheless, we continued to monitor the operation by sinkholing domains and nalyzing victim connections. During this monitoring, we observed an interesting type of connection which seemed to indicate a Java version of Icefog, further to be referenced as “Javafog”. https://securelist.com/the-icefog-apt-hits-us-targets-with-java-backdoor/58209/

Operations: 2015

Operations: “TOPNEWS” Campaign Target: Government, media, and finance organizations in Russia and Mongolia.

Operations: 2016

Operations: “APPER” Campaign Target: Kazach officials.

Operations: 2018

Operations: “WATERFIGHT” Campaign Target: Water source provider, banks, and government entities in Turkey, India, Kazakhstan, Uzbekistan, and Tajikistan.

Operations: 2018

Operations: “PHKIGHT” Campaign Target: An unknown entity in the Philippines.

Operations: 2018/2019

Operations: “SKYLINE” Campaign Target: Organizations in Turkey and Kazakhstan. https://www.zdnet.com/article/ancient-icefog-apt-malware-spotted-again-in-new-wave-of-attacks/

Information: https://media.kaspersky.com/en/icefog-apt-threat.pdf

Information: https://d2538mqrb7brka.cloudfront.net/wp-content/uploads/sites/43/2018/03/20133739/icefog.pdf

Information: https://speakerdeck.com/ashley920/into-the-fog-the-return-of-icefog-apt

Last-card-change: 2021-04-20

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1053.002
SCHEDULED TASK/JOB : AT
at can be used to schedule a task on a system to be executed at a specific date or time.
T1053.002
SCHEDULED TASK/JOB : AT
at can be used to schedule a task on a system to be executed at a specific date or time.
T1053.002
SCHEDULED TASK/JOB : AT
at can be used to schedule a task on a system to be executed at a specific date or time.