I-Soon: Operation FishMedley
by sovrvltn - Tuesday March 25, 2025 at 10:36 AM
#1
"FishMonger – a group believed to be operated by the Chinese contractor I‑SOON (see our Q4 2023-Q1 2024 APT Activity Report) – falls under the Winnti Group umbrella and is most likely operating out of China, from the city of Chengdu where I‑SOON’s office was located. FishMonger is also known as Earth Lusca, TAG‑22, Aquatic Panda, or Red Dev 10. We published an analysis of this group in early 2020 when it heavily targeted universities in Hong Kong during the civic protests that started in June 2019. We initially attributed the incident to Winnti Group but have since revised our attribution to FishMonger.

The group is known to operate watering-hole attacks, as reported by Trend Micro. FishMonger’s toolset includes ShadowPad, Spyder, Cobalt Strike, FunnySwitch, SprySOCKS, and the BIOPASS RAT."

https://www.welivesecurity.com/en/eset-r...ishmedley/
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Gmail breach is real or not? dai5 5 433 7 hours ago
Last Post: dai5
  Canvas login portals hacked in mass ShinyHunters extortion campaign namenonamen 1 109 8 hours ago
Last Post: felowfren
  Zara data breach exposed personal information of 197,000 people namenonamen 1 87 10 hours ago
Last Post: darkbigfoot
  Critical vm2 sandbox bug lets attackers execute code on hosts namenonamen 0 87 10 hours ago
Last Post: namenonamen
  Where to buy The Best POE Patch 3.28 & POE 2 Currency? salisy 2 154 10 hours ago
Last Post: namenonamen

Forum Jump:


 Users browsing this forum: 1 Guest(s)