Security Experts:

Connect with us

Hi, what are you looking for?



China-Linked ‘Thrip’ Cyberspies Continue Attacks on Southeast Asia

The China-linked threat actor tracked by Symantec as Thrip has continued to target entities in Southeast Asia even after the cybersecurity firm exposed its operations.

The China-linked threat actor tracked by Symantec as Thrip has continued to target entities in Southeast Asia even after the cybersecurity firm exposed its operations.

The activities of the Thrip group were brought to light in June 2018 by Symantec. The company revealed at the time that the threat actor had been active since at least 2013 and it had targeted entities in Southeast Asia and the United States.

Thrip’s attacks involve both custom malware and legitimate tools, and its targets include defense contractors, telecoms companies, and satellite operators.

In a new report published on Monday, Symantec said the group has continued launching attacks against entities in Southeast Asia, including military, satellite communications, media and educational organizations. The company has identified a dozen victims in this region, including in Hong Kong, Macau, Indonesia, the Philippines, Malaysia and Vietnam.

During its analysis of the most recent Thrip campaigns, Symantec has identified a new backdoor called Hannotog, which the hackers appear to have used since at least January 2017. Hannotog is a custom-built backdoor that allows the cyberspies to remain persistent on compromised networks. It has been used alongside other tools, such as the Sagerunex backdoor and the Catchamas information stealer.

Sagerunex, which provides attackers remote access to systems, helped Symantec link Thrip to another group, Billbug, also known as Lotus Blossom. Billbug has been targeting organizations in South Asia — including many military and government organizations — since at least January 2009 and Thrip is now believed to be a subgroup of Billbug.

Researchers connected the two groups based on very similar code in Sagerunex and Evora, an older Billbug tool. Symantec believes Sagerunex is actually an evolution of Evora.

“[Thrip’s] link to the Billbug group puts its activities into context and proves its attacks are part of a broader range of espionage activity heavily focused on (but not limited to) governments, armed forces, and communications providers,” Symantec said.

Related: China-Linked Threat Actor Using New Backdoor

Related: China’s APT27 Hackers Use Array of Tools in Recent Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


Iranian APT Moses Staff is leaking data stolen from Saudi Arabia government ministries under the recently created Abraham's Ax persona


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.


Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.


The UK’s NCSC has issued a security advisory to warn about spearphishing campaigns conducted by two unrelated Russian and Iranian hacker groups.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...