Cyber Threat Report: 'Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation'

Report Author Insikt Group
Publication Date 2024-06-24
Original Reporting Source
Attributed to Nation China
Related Intrusion Sets Ethereal Panda , Flax Typhoon , RedJuliett
Identified CVEs CVE-2016-5195
Victim Sectors Ministries of Foreign Affairs, Education, Technology

This report by Recorded Future's Insikt Group details activity by RedJuliett between November 2023 and April 2024. RedJuliett, also known by aliases Flax Typhoon (Microsoft) and Ethereal Panda (CrowdStrike), is a suspected Chinese state-sponsored cyber-espionage group with operations dating back to mid-2021. Based in Fuzhou, Fujian Province, their activities align with China's strategic objectives, particularly targeting Taiwan amid sensitive cross-strait relations. According to the report, RedJuliett has focused on collecting intelligence from government, education, technology, and diplomatic entities, with additional targeting observed in regions including South East Asia, Africa, and the United States. Insikt Group analysts observed the group actively scanning for vulnerabilities and then exploiting internet-facing devices, such as VPNs, firewalls, and load balancers as well as using SQL injection and directory traversal exploits. Post-exploitation activities included deployment of web shells (e.g. devilzShell, AntSword), exploitation of Linux privilege escalation vulnerability DirtyCow (CVE-2016-5195). Notably, the group used SoftEther VPN to administer operational infrastructure, leveraging a combination of leased servers and compromised infrastructure belonging to three Taiwanese universities. Their frequent targeting of critical technology companies and government entities highlights a focus on intelligence supporting economic and geopolitical decision-making.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1505.003 Web Shell Persistence
T1190 Exploit Public-Facing Application Initial Access
T1584 Compromise Infrastructure Resource Development
T1068 Exploitation for Privilege Escalation Privilege Escalation
T1583.003 Virtual Private Server Resource Development
T1595.002 Vulnerability Scanning Reconnaissance
T1133 External Remote Services Initial Access, Persistence