Cyber Threat Report: 'RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale'

Report Author Recorded Future
Publication Date 2023-08-08
Original Reporting Source
Attributed to Nation China
Related Intrusion Sets Earth Lusca , TAG-22 , RedHotel
Related Threat Actors Chinese Ministry of State Security
Identified CVEs CVE-2022-30333 , CVE-2022-37042 , CVE-2022-27924 , CVE-2022-24682 , CVE-2022-27925
Victim Sectors National Government, Aerospace, Telecommunications, Education, Regional Govenment

This report from Recorded Future's Insikt Group outlines activity by the Red Hotel intrusion set. RedHotel is identified as a prominent Chinese state-sponsored threat activity group, which operates with a dual mission of intelligence gathering and economic espionage. While frequently targeting government organizations for traditional intelligence collection, RedHotel has also focused on COVID-19 research and technology R&D institutions. Notably, in July 2022, the group likely compromised a US state legislature. Their infrastructure communicates with RedHotel-attributed ShadowPad and Cobalt Strike C2 IP addresses. RedHotel maintains two distinct infrastructure clusters—one for reconnaissance and initial access, and another for long-term network control via command-and-control servers. Active since at least 2019, RedHotel also employs a mix of offensive security tools, closed-source shared capabilities, and bespoke tooling across their campaigns.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques