Common Information
Type Value
Value
BARIUM
Category Actor
Type Microsoft-Activity-Group
Misp Type Cluster
Description Microsoft Threat Intelligence associates Winnti with multiple activity groups—collections of malware, supporting infrastructure, online personas, victimology, and other attack artifacts that the Microsoft intelligent security graph uses to categorize and attribute threat activity. Microsoft labels activity groups using code names derived from elements in the periodic table. In the case of this malware, the activity groups strongly associated with Winnti are BARIUM and LEAD. But even though they share the use of Winnti, the BARIUM and LEAD activity groups are involved in very different intrusion scenarios. BARIUM begins its attacks by cultivating relationships with potential victims—particularly those working in Business Development or Human Resources—on various social media platforms. Once BARIUM has established rapport, they spear-phish the victim using a variety of unsophisticated malware installation vectors, including malicious shortcut (.lnk) files with hidden payloads, compiled HTML help (.chm) files, or Microsoft Office documents containing macros or exploits. Initial intrusion stages feature the Win32/Barlaiy implant—notable for its use of social network profiles, collaborative document editing sites, and blogs for C&C. Later stages of the intrusions rely upon Winnti for persistent access. The majority of victims recorded to date have been in electronic gaming, multimedia, and Internet content industries, although occasional intrusions against technology companies have occurred.
Details Published Attributes CTI Title
Details Website 2024-10-30 7 5 Critical Threat Actors You Need to Know About - ReliaQuest
Details Website 2024-10-02 6 Chinese Threat Groups That Use Ransomware and Ransomware Groups That Use Chinese Names
Details Website 2024-09-03 6 Threat Intelligence RoundUp: August
Details Website 2024-07-12 1 China's APT41 crew adds stealthy malware to its toolbox
Details Website 2024-05-21 43 Uncovering an undetected KeyPlug implant attacking industries in Italy   - Yoroi
Details Website 2023-11-03 5 Vertical Target Series: Industrials and Industrial Sub-Verticals
Details Website 2023-09-06 22 Finding WyrmSpy and DragonEgg Ties to APT41 in the DNS
Details Website 2023-07-27 8 Rewterz Threat Alert – APT Group Gamaredon aka Shuckworm – Active IOCs
Details Website 2023-07-27 27 Rewterz Threat Alert – China-linked Group APT41 Targets Mobile Devices With New WyrmSpy and DragonEgg Spyware – Active IOCs
Details Website 2023-07-27 6 Rewterz Threat Advisory – Multiple Jenkins Plugins Vulnerabilities
Details Website 2023-07-27 3 Rewterz Threat Advisory – CVE-2023-1893 – WordPress Login Configurator Plugin Vulnerability
Details Website 2023-07-27 7 Rewterz Threat Advisory – Multiple Trend Micro Apex Central Vulnerabilities
Details Website 2023-07-26 5 Rewterz Threat Alert – CVE-2023-38606 – Apple macOS, iOS and iPadOS Vulnerability Exploited in the Wild
Details Website 2023-07-26 18 Rewterz Threat Alert – Banking Sector Targeted In Open-Source Software Supply Chain Attacks – Active IOCs
Details Website 2023-07-24 40 Optiv’s gTIC Prioritized Software and Services List + MITRE Tactics Part IV: Microsoft Software and Products
Details Website 2023-07-24 48 Rewterz Threat Alert – China-linked Group APT41 Targets Mobile Devices With New WyrmSpy and DragonEgg Spyware – Active IOCs
Details Website 2023-07-24 2 Rewterz Threat Advisory – CVE-2023-3446 – OpenSSL Vulnerability
Details Website 2023-07-22 3 Chinese Threat Group APT41 Linked to Daring Android Malware Attack!
Details Website 2023-07-20 1 Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware - RedPacket Security
Details Website 2023-07-19 3 Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg Spyware
Details Website 2023-07-19 26 What Is Advanced Persistent Threat (APT)?
Details Website 2023-07-19 1 Why Should Enterprises Care About APTs? Defend Against Chinese, Russian Cyber Espionage Hacking Groups and Other Nation-State Actors
Details Website 2023-07-19 53 WyrmSpy and DragonEgg: Lookout Attributes Android Spyware to China’s APT41 | Threat Intel
Details Website 2023-07-14 1 Hackers target Pakistani government, bank and telecom provider with China-made malware
Details Website 2023-05-04 2 APT41 exploits the Google Command and Control (GC2) tool