I-Soon: Operation FishMedley
by sovrvltn - Tuesday March 25, 2025 at 10:36 AM
#1
"FishMonger – a group believed to be operated by the Chinese contractor I‑SOON (see our Q4 2023-Q1 2024 APT Activity Report) – falls under the Winnti Group umbrella and is most likely operating out of China, from the city of Chengdu where I‑SOON’s office was located. FishMonger is also known as Earth Lusca, TAG‑22, Aquatic Panda, or Red Dev 10. We published an analysis of this group in early 2020 when it heavily targeted universities in Hong Kong during the civic protests that started in June 2019. We initially attributed the incident to Winnti Group but have since revised our attribution to FishMonger.

The group is known to operate watering-hole attacks, as reported by Trend Micro. FishMonger’s toolset includes ShadowPad, Spyder, Cobalt Strike, FunnySwitch, SprySOCKS, and the BIOPASS RAT."

https://www.welivesecurity.com/en/eset-r...ishmedley/
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  BlackSuit ransomware extortion sites seized in Operation Checkmate lulagain 1 289 07-30-2025, 02:47 PM
Last Post: Shadowraser
  Operation PHOBOS AETOR lulagain 0 352 02-11-2025, 08:04 PM
Last Post: lulagain
  DOJ Press Release For Operation Talent Sythe 0 351 01-31-2025, 01:31 AM
Last Post: Sythe
  Apple refused to pay bounty to Kaspersky (Operation Triangulation) el_farado 7 631 10-17-2024, 08:10 PM
Last Post: breachxyz
  Operation EndGame!? Declassified 1 399 09-30-2024, 05:01 PM
Last Post: cryphex

Forum Jump:


 Users browsing this thread: 1 Guest(s)