Cyber Threat Report: 'APT41 Has Arisen From the DUST'

Report Author Mandiant
Publication Date 2024-07-18
Original Reporting Source
Attributed to Nation China
Related Intrusion Sets APT41
Victim Sectors Media, Automotive, Technology

This report from Mandiant outlines APT41 activity observed since 2023 including successful compromises of logistic, media, technology and automotive companies across Europe and Asia. The report discusses the use of ANTSWORD and BLUEBEAM webshells as well as custom and commodity tooling. DUSTPAN is an in-memory dropper used to load Cobalt Strike BEACON. DUSTTRAP is multi-stage plugin framework with support for at least 15 different plugin modules from shell operations to network probing and keylogging. SQLULDR2 is a command line utility which was used to dump the contents of an Oracle database to a local file. Finally, PINEGROVE is another command line utility used to exfiltrate data to OneDrive. The report includes analysis of the components used as well as host and network indicators of compromise and YARA rules for detection.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques