Cyber Threat Report: 'Unveiling TeleBoyi: Chinese APT Group Targeting Critical Infrastructure Worldwide'

Report Author TeamT5
Publication Date 2024-01-25
Original Reporting Source
Attributed to Nation China
Related Intrusion Sets FamousSparrow , APT41 , TeleBoyi
Victim Sectors Telecommunications, Energy, Education, Financial Services, Technology, National Government, Nuclear, Healthcare, Manufacturing

This presentation from TeamT5 describes the intrusion set they refer to as TeleBoyi and was presented at JPCERT's JSAC2024 conference on January 25. The presentation provides an in-depth look at TeleBoyi's operations, including their interest in critical infrastructure, malware delivery mechanisms, and their arsenal of tools and malware. TeamT5 attributes TeleBoyi as a China-nexus APT group active since 2014, targeting critical infrastructure worldwide, especially in the APAC region. The presentation details malware used by the group, including ShadowPad, Winnti, PlugX, LibreCoin, DoubleShell, and others. TeleBoyi normally gain initial access through one of three ways: fake applications, malicious documents or exploitation of public-facing applications. TeamT5 assess that the group shares tools and has potential collaboration with other APT groups, including APT41, Earth Berberoka, and SLIME40 (FamousSparrow/GroundPeony).

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph