Liminal Panda

China

Details

Since at least 2020, LIMINAL PANDA has targeted telecommunications entities, using custom tools that enable covert access, command and control (C2), and data exfiltration. The adversary demonstrates extensive knowledge of telecommunications networks, including understanding interconnections between providers; LIMINAL PANDA has used compromised telecoms servers to initiate intrusions into further p...

Objective

  • 5CBgbMQUWTNf7khjyJrzcYt

Motivation

  • uOBMZS3sGx9DUqw

Contact our team about
IOCs for this adversary

?

During a cybersecurity incident, indicators of compromise (IoC) are clues and evidence of a data breach.