The China-linked threat actor tracked by Symantec as Thrip has continued to target entities in Southeast Asia even after the cybersecurity firm exposed its operations.
The activities of the Thrip group were brought to light in June 2018 by Symantec. The company revealed at the time that the threat actor had been active since at least 2013 and it had targeted entities in Southeast Asia and the United States.
Thrip’s attacks involve both custom malware and legitimate tools, and its targets include defense contractors, telecoms companies, and satellite operators.
In a new report published on Monday, Symantec said the group has continued launching attacks against entities in Southeast Asia, including military, satellite communications, media and educational organizations. The company has identified a dozen victims in this region, including in Hong Kong, Macau, Indonesia, the Philippines, Malaysia and Vietnam.
During its analysis of the most recent Thrip campaigns, Symantec has identified a new backdoor called Hannotog, which the hackers appear to have used since at least January 2017. Hannotog is a custom-built backdoor that allows the cyberspies to remain persistent on compromised networks. It has been used alongside other tools, such as the Sagerunex backdoor and the Catchamas information stealer.
Sagerunex, which provides attackers remote access to systems, helped Symantec link Thrip to another group, Billbug, also known as Lotus Blossom. Billbug has been targeting organizations in South Asia — including many military and government organizations — since at least January 2009 and Thrip is now believed to be a subgroup of Billbug.
Researchers connected the two groups based on very similar code in Sagerunex and Evora, an older Billbug tool. Symantec believes Sagerunex is actually an evolution of Evora.
“[Thrip’s] link to the Billbug group puts its activities into context and proves its attacks are part of a broader range of espionage activity heavily focused on (but not limited to) governments, armed forces, and communications providers,” Symantec said.
Related: China-Linked Threat Actor Using New Backdoor
Related: China’s APT27 Hackers Use Array of Tools in Recent Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
