Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

RedFoxtrot (Nomad Panda) – Threat Actor

January 25, 2025
Reading Time: 3 mins read
in Threat Actors
RedFoxtrot (Nomad Panda) – Threat Actor

RedFoxtrot

Other Names

Nomad Panda
TEMP.Trident
Moshen Dragon

Location

China

Date of initial activity

2014

Suspected Attribution 

State-Sponsored Threat Group

Government Affiliation

Yes

Motivation

Cyberwarfare
Data Theft

Associated Tools

8.t Dropper
GUNTERS

Icefog
Impacket

PCShare

PlugX

Poison Ivy
ShadowPad
Winnti

Software

Windows
Servers

Overview

RedFoxtrot, an advanced persistent threat (APT) group known under various aliases including Nomad Panda, TEMP.Trident, and Moshen Dragon, represents a formidable and sophisticated player in the realm of state-sponsored cyber espionage. Active since at least 2014, RedFoxtrot is widely believed to be associated with China’s PLA Unit 69010, a unit known for its focus on cyber intelligence and strategic operations. The group’s operations have consistently targeted high-value sectors such as government, defense, and telecommunications, particularly across Central Asia, India, and Pakistan.

Common Targets 

  • India
  • Afghanistan
  • Pakistan
  • Kazhakhstan
  • Public Administration
  • Information

Attack vectors

  • Phishing
  • Web Browsing
  • Software Vulnerabilities

How they work

RedFoxtrot’s operations are marked by their precision and strategic focus. The group has demonstrated a clear alignment with the interests of PLA Unit 69010, engaging in activities that support information theft and espionage on a grand scale. Their extensive targeting of government agencies, defense contractors, and major telecommunications providers underscores their capability and intent to gather critical information from regions of strategic importance to China. Recent reports have highlighted RedFoxtrot’s incursions into Indian aerospace and defense sectors, as well as its disruptive activities against telecommunications infrastructure in Afghanistan, Kazakhstan, and Pakistan. The technical sophistication of RedFoxtrot is evident in their choice of tools and methods. The group employs a blend of bespoke and publicly available malware, reflecting a high degree of customization and adaptability. Notable tools in their arsenal include Icefog, PlugX, Royal Road, Poison Ivy, ShadowPad, and PCShare, each chosen for its specific capabilities in remote access, data exfiltration, and persistent control. This diverse toolkit allows RedFoxtrot to execute a range of operations, from initial intrusion to long-term surveillance and data extraction. In recent years, RedFoxtrot’s activities have underscored the group’s strategic objectives and operational proficiency. Incidents such as the targeted attack on Roshan’s mail server in Afghanistan highlight the group’s ongoing commitment to high-impact cyber espionage operations. As a result, RedFoxtrot remains a significant concern for cybersecurity professionals and organizations operating within the group’s areas of interest. Understanding the nature and scope of RedFoxtrot’s activities is crucial for developing effective defenses against this persistent and evolving cyber threat.

MITRE Tactics and Techniques

Initial Access (TA0001): RedFoxtrot employs various methods to gain initial access to targeted systems, including spear-phishing and exploiting vulnerabilities. Execution (TA0002): Once inside the network, RedFoxtrot uses tools like 8.t Dropper and PlugX to execute malicious payloads and maintain control over compromised systems. Persistence (TA0003): The threat actor uses techniques such as establishing backdoors and utilizing tools like Poison Ivy and ShadowPad to ensure continued access to infected systems. Privilege Escalation (TA0004): RedFoxtrot may use methods to escalate privileges on compromised systems, allowing them to gain higher levels of access and control. Defense Evasion (TA0005): The threat actor employs techniques to evade detection and analysis, including using custom malware like GUNTERS and leveraging known RATs to blend in with legitimate activity. Credential Access (TA0006): RedFoxtrot targets credentials through techniques such as credential dumping and keylogging to facilitate further access and lateral movement within the network. Discovery (TA0007): The group conducts extensive reconnaissance within the network, using tools like Impacket to map out the environment and identify valuable targets. Lateral Movement (TA0008): RedFoxtrot utilizes techniques to move laterally across the network, using tools and exploits to access other systems and expand their control. Collection (TA0009): The threat actor gathers valuable information from compromised systems, employing various tools to exfiltrate data of interest. Exfiltration (TA0010): RedFoxtrot exfiltrates collected data using various methods, ensuring that sensitive information is successfully transferred out of the target network. Command and Control (TA0011): The group establishes and maintains command and control channels using tools like PCShare and Icefog, allowing them to remotely manage and manipulate compromised systems.
References:
  • Threat Group Cards: A Threat Actor Encyclopedia
Tags: AfghanistanAPTAsiaGovernmentIndiaKazhakhstanMoshen DragonNomad PandaPakistanPhishingRedFoxtrotTEMP.TridentThreat Actors
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Microsoft Defender Bug Allows SYSTEM Access

Uncanny Automator Bug Risks WordPress Sites

Devs Hit By PyPI Solana Token Secret Theft

Subscribe to our newsletter

    Latest Incidents

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    Alabama Cybersecurity Event Hits Services

    Andy Frain Data Breach Impacts 100k People

    Hong Kong DSC Hit By Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial