Liminal Panda

China

Details

Since at least 2020, LIMINAL PANDA has targeted telecommunications entities, using custom tools that enable covert access, command and control (C2), and data exfiltration. The adversary demonstrates extensive knowledge of telecommunications networks, including understanding interconnections between providers; LIMINAL PANDA has used compromised telecoms servers to initiate intrusions into further p...

Objective

  • AeZxRz1H7ONbgQ4ktXdjaMu

Motivation

State-Sponsored

Contact our team about
IOCs for this adversary

?

During a cybersecurity incident, indicators of compromise (IoC) are clues and evidence of a data breach.