ChamelGang | |
Other Names | CamoFei |
Location | China |
Date of Initial Activity | 2021 |
Suspected Attribution | Cybercriminals |
Motivation | Espionage |
Associated Tools | CatB Ransomware BestCrypt BitLocker |
Software | Servers |
Overview
In the realm of cyberespionage, ChamelGang stands out as a particularly sophisticated and dangerous threat actor. Believed to be a Chinese Advanced Persistent Threat (APT) group, ChamelGang has demonstrated a disturbing trend of targeting critical infrastructure and high-profile organizations worldwide. Their operations are characterized by a blend of traditional espionage techniques and modern cyber capabilities, making them a significant player in the landscape of cyber threats.
ChamelGang has garnered attention for its strategic use of ransomware in cyberattacks, employing it as both a tool for financial gain and a means of disrupting or distracting targeted entities. This approach reflects a broader trend where cyberespionage groups leverage ransomware not merely for extortion but as a strategic weapon in their broader operations. Their attacks are marked by a high degree of sophistication, utilizing custom malware and advanced techniques to infiltrate and compromise their targets.
One of the group’s most notable operations involved high-profile intrusions in 2022, targeting the All India Institute of Medical Sciences (AIIMS) and the Presidency of Brazil. These attacks, publicly disclosed as ransomware incidents, have yet to be officially attributed but show clear indicators of ChamelGang’s involvement. Their choice of targets and the nature of their attacks align with known patterns of behavior, suggesting a calculated approach to cyberespionage that blends financial motivations with strategic objectives.
ChamelGang’s activities extend beyond ransomware, encompassing a wide range of tactics aimed at critical infrastructure and government organizations. Their operations in East Asia and the Indian subcontinent, including attacks on aviation sectors, underscore their capability and intent to disrupt essential services and governmental functions. The group’s use of custom tools and malware, such as BeaconLoader and CatB ransomware, highlights their advanced technical proficiency and persistent threat.
Common Targets
- Information
- Public Administration
- Manufacturing
- Health Care and Social Assistance
- Retail Trade
- Accommodation and Food Services
- India
- Brazil
- United States
- Russia
- Taiwan
- Japan