Double Dragon (hacking Group)
   HOME

TheInfoList



OR:

Double Dragon is a
hacker group Hacker groups are informal communities that began to flourish in the early 1980s, with the advent of the home computer. Overview Prior to that time, the term ''hacker'' was simply a referral to any Hacker (hobbyist), computer hobbyist. The hacker ...
with alleged ties to the Chinese Ministry of State Security (MSS). Classified as an
advanced persistent threat An advanced persistent threat (APT) is a stealthy threat actor, typically a State (polity), state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the ...
, the organization was named by the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the U.S. government that oversees the domestic enforcement of Law of the Unite ...
in September 2020 in relation to charges brought against five Chinese and two Malaysian nationals for allegedly compromising more than 100 companies around the world. In 2019, the cybersecurity company
FireEye Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company that was founded in 2022. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and ana ...
stated with high confidence that the group was sponsored by the
Chinese Communist Party The Communist Party of China (CPC), also translated into English as Chinese Communist Party (CCP), is the founding and One-party state, sole ruling party of the People's Republic of China (PRC). Founded in 1921, the CCP emerged victorious in the ...
(CCP) while conducting operations for financial gain. The name "Double Dragon" originates from the duality of their operation, as they engage in espionage and individual financial gain. The devices they use are usually used for state-sponsored intelligence. Investigations conducted by FireEye have found APT 41 operations in multiple sectors, such as healthcare, telecommunications, and technology. The group conducts many of its financial activities in the video game industry, including development studios, distributors, and publishers.


Associated personnel

In their earlier activities, APT 41 has used domains registered to the monikers "Zhang Xuguang" (
simplified Chinese Simplification, Simplify, or Simplified may refer to: Mathematics Simplification is the process of replacing a mathematical expression by an equivalent one that is simpler (usually shorter), according to a well-founded ordering. Examples include: ...
: 张旭光) and "Wolfzhi". These online personas are associated with APT 41's operations and specific online Chinese language forums, although the number of other individuals working for the group is unknown. "Zhang Xuguang" has activity on the online forum Chinese Hackers Alliance (simplified Chinese: 华夏黑 客同盟). Information related to this individual includes his year of birth, 1989, and his former living in
Inner Mongolia Inner Mongolia, officially the Inner Mongolia Autonomous Region, is an Autonomous regions of China, autonomous region of China. Its border includes two-thirds of the length of China's China–Mongolia border, border with the country of Mongolia. ...
of PRC. The persona has also posted on a forum regarding the
Age of Wushu ''Age of Wushu'' is a free-to-play 3D martial arts action MMORPG, created by independent developers and procured by Chinese company Snail. The game revolves around the wuxia-inspired lore surrounding martial arts and adventures in Ming dynasty ...
online game, using the moniker "injuriesa" in 2011. Emails and online domains associated with "Wolfzhi" also lead to a data science community profile. Forum posts also suggest that the individual is from Beijing or the nearby province,
Hebei Hebei is a Provinces of China, province in North China. It is China's List of Chinese administrative divisions by population, sixth-most populous province, with a population of over 75 million people. Shijiazhuang is the capital city. It bor ...
. The
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
has issued wanted posters for Haoran Zhang, Dailin Tan, Chuan Qian, Qiang Fu, and Lizhi Jiang, whom they have found to be linked with APT 41. Zhang and Tan were indicted on August 15, 2019, by the
Grand jury A grand jury is a jury empowered by law to conduct legal proceedings, investigate potential criminal conduct, and determine whether criminal charges should be brought. A grand jury may subpoena physical evidence or a person to testify. A grand ju ...
in the
District of Columbia Washington, D.C., formally the District of Columbia and commonly known as Washington or D.C., is the capital city and Federal district of the United States, federal district of the United States. The city is on the Potomac River, across from ...
for charges associated with hacking offences, such as unauthorized access to protected computers, aggravated identity theft, money laundering and wire fraud. These actions were conducted on high-tech companies, video-game companies and six unnamed individuals from the United States and the United Kingdom while the two worked together. The FBI also charged Qian, Fu, and Jiang on August 11, 2020, for
racketeering Racketeering is a type of organized crime in which the perpetrators set up a coercion, coercive, fraud, fraudulent, extortionary, or otherwise illegal coordinated scheme or operation (a "racket") to repeatedly or consistently collect a profit. ...
, money laundering, fraud, and
identity theft Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
. All three individuals were part of the management team of the Chengdu 404 Network Technology company, where the three and coworkers planned cyber attacks against companies and individuals in industries like communications, media, security, and government. Such operations were to occur in countries like the United States, Brazil, Germany, India, Japan, Sweden,
Indonesia Indonesia, officially the Republic of Indonesia, is a country in Southeast Asia and Oceania, between the Indian Ocean, Indian and Pacific Ocean, Pacific oceans. Comprising over List of islands of Indonesia, 17,000 islands, including Sumatra, ...
,
Malaysia Malaysia is a country in Southeast Asia. Featuring the Tanjung Piai, southernmost point of continental Eurasia, it is a federation, federal constitutional monarchy consisting of States and federal territories of Malaysia, 13 states and thre ...
,
Pakistan Pakistan, officially the Islamic Republic of Pakistan, is a country in South Asia. It is the List of countries and dependencies by population, fifth-most populous country, with a population of over 241.5 million, having the Islam by country# ...
, Singapore,
South Korea South Korea, officially the Republic of Korea (ROK), is a country in East Asia. It constitutes the southern half of the Korea, Korean Peninsula and borders North Korea along the Korean Demilitarized Zone, with the Yellow Sea to the west and t ...
,
Taiwan Taiwan, officially the Republic of China (ROC), is a country in East Asia. The main geography of Taiwan, island of Taiwan, also known as ''Formosa'', lies between the East China Sea, East and South China Seas in the northwestern Pacific Ocea ...
, and
Thailand Thailand, officially the Kingdom of Thailand and historically known as Siam (the official name until 1939), is a country in Southeast Asia on the Mainland Southeast Asia, Indochinese Peninsula. With a population of almost 66 million, it spa ...
. In August 2020, Wong Ong Hua and Ling Yang Ching, were both charged with racketeering, conspiracy, identity theft, aggravated identity theft and fraud among others. The United States Department of Justice says that the two Malaysian businessmen were working with the Chinese hackers to target video game companies in the United States, France, South Korea, Japan and Singapore and profit from these operations. These schemes, particularly a series of computer intrusions involving gaming industries, were conducted under the Malaysian company Sea Gamer Mall, which was founded by Wong. On September 14, 2020, Malaysian authorities arrested both individuals in Sitawan.


Ties with the Chinese government

APT 41's operations are described as "
moonlighting Moonlighting may refer to: * Side job, a job taken in addition to one's primary employment Entertainment * ''Moonlighting'' (film), a 1982 drama film by Jerzy Skolimowski * ''Moonlighting'' (TV series), 1985–1989 American television series, s ...
" due to their balance of espionage supported by the Chinese state and financially motivated activities outside of state authorization in their downtime. As such, it is harder to ascertain whether particular incidents are state-directed or not. The organization has conducted multiple operations against 14 countries, most notably the United States. Such activities include incidents of
tracking Tracking may refer to: Science and technology Computing * Tracking, in computer graphics, in match moving (insertion of graphics into footage) * Tracking, composing music with music tracker software * Eye tracking, measuring the position of ...
, the compromising of business
supply chain A supply chain is a complex logistics system that consists of facilities that convert raw materials into finished products and distribute them to end consumers or end customers, while supply chain management deals with the flow of goods in distri ...
s, and collecting
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
data. In 2022, APT 41 was linked to theft of at least $20 million in COVID-19 relief aid in the U.S. APT 41 uses
cyber-espionage Cyber espionage, cyber spying, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers th ...
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
typically kept exclusive to the Chinese government. This characteristic is common for other advanced persistent threats, as this allows them to derive information to spy on high-profile targets or make contact with them to gain information that benefits
national interest The national interest is a sovereign state's goals and ambitions – be they economic, military, cultural, or otherwise – taken to be the aim of its government. Etymology The Italian phrase ''ragione degli stati'' was first used by Giovanni de ...
. APT 41 relation to the Chinese state can be evidenced by the fact that none of this information is on the
dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
and may be obtained by the CCP. APT 41 targeting is consistent with the Chinese government's national plans to move into high research and development fields and increase production capabilities. Such initiatives coincide with the Chinese government's "
Made in China 2025 Made in China 2025 (MIC25, MIC 2025, or MIC2025; )Made in China 2025
. CSIS, June 1, 20 ...
" plan, aiming to move Chinese production into high-value fields such as
pharmacy Pharmacy is the science and practice of discovering, producing, preparing, dispensing, reviewing and monitoring medications, aiming to ensure the safe, effective, and affordable use of medication, medicines. It is a miscellaneous science as it ...
, semi-conductors, and other
high-tech High technology (high tech or high-tech), also known as advanced technology (advanced tech) or exotechnology, is technology that is at the cutting edge: the highest form of technology available. It can be defined as either the most complex or ...
sectors. FireEye has also evaluated with moderate confidence that APT 41 may engage in contract work associated with the Chinese government. Identified personas associated with the group have previously advertised their skills as hackers for hire. Their usage of HOMEUNIX and PHOTO in their personal and financially motivated operations, which are malware inaccessible to the public used by other state-sponsored espionage actors also evidences this stance. It is also recognized in China that more skilled hackers tend to work in the private sector under government contracts due to the higher pay. The FireEye report also noted that the Chinese state has depended on contractors to assist with other state operations focused on cyber-espionage, as demonstrated by prior Chinese advanced persistent threats like APT 10. APT 41 is viewed by some as potentially made up of skilled Chinese citizens, who are used and employed by the Chinese government, leading to the assumptions that members of the group often work two jobs, which is supported by their operating hours.


Techniques

The operating techniques of APT 41 are distinct, particularly in their usage of passive backdoors compared to traditional ones. While traditional backdoors used by other advanced persistent threats are easily detectable, this technique is often much harder to identify. Techniques applied in financially motivated APT 41 activity also include software supply-chain compromises. This has allowed them to implement injected codes into legitimate files to be distributed, which endanger other organizations by stealing data and altering systems. Sophisticated malware is often deployed as well to remain undetected while extracting data.
Bootkit A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exist ...
s are also a type of malware used by the group, which is both difficult to detect and harder to find among other cyber espionage and
cybercrime Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or Computer network, networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cyberc ...
groups, making it harder for security systems to detect malicious code. They also used Deadeye launcher and Lowkey malware to perform instant reconnaissance while remaining undetected. Recent research highlights Double Dragon’s (APT41) use of modified TLS certificates, particularly wolfSSL, to mask their command-and-control (C2) infrastructure. By customizing fields to generate unique JA4X fingerprints, they evade detection while advancing their cyber espionage tactics. Spear-phishing emails are regularly used by APT 41 across both cyber espionage and financial attacks. The group has sent many misleading emails which attempt to take information from high-level targets after gathering personal data to increase the likelihood of success. Targets have varied from media groups for espionage activities to
bitcoin Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
exchanges for financial gain.


Activities

Espionage activity APT 41's targeting is deemed by FireEye to correlate with China's national strategies and goals, particularly those regarding technology. The targeting of tech firms align with Chinese interest in developing high-tech instruments domestically, as demonstrated by the 12th and 13th Five-Year Plans. The attack on organizations in various different sectors is believed by FireEye to be indicative of APT 41 fulfilling specifically assigned tasks. Campaigns attributed to APT 41 also demonstrates that the group is used to obtain information before major political and financial events. They have attacked companies in 14 different countries (and Hong Kong) including France, India, Italy, Japan, Myanmar, the Netherlands, Singapore, South Korea, South Africa, Switzerland, Thailand, Turkey, the United Kingdom, and the United States. They have also been discovered in several different industries, including healthcare, telecommunications, and technology. The German company TeamViewer AG, behind the popular software of the same name which allowed system control remotely, was hacked in June 2016 by APT 41 according to a FireEye security conference. The group was able to access the systems of TeamViewer users around the world and obtain management details and information regarding businesses. In 2021 APT 41 launched several phishing scams in India that were found by the BlackBerry Research and Intelligence. They also stole data relating to new tax legislation and COVID-19 records and statistics. The group masked their identity to be the
Indian government The Government of India (ISO: Bhārata Sarakāra, legally the Union Government or Union of India or the Central Government) is the national authority of the Republic of India, located in South Asia, consisting of 36 states and union territor ...
so that they would remain undetected. Financially motivated activities APT 41 has targeted the video-game industry for the majority of its activity focused on financial gain. Chinese internet forums indicated that associated members linked to APT 41 have advertised their hacking skills outside of Chinese office hours for their own profits. In one FireEye reported case, the group was able to generate virtual game currency and sell it to buyers through underground markets and laundering schemes, which could have been sold for up to US$300,000. Although it is not a typical method used by the group for collecting money, APT 41 also attempted to deploy
ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
to profit from their operations. FireEye reports that because most of APT 41's financially motivated activity occurs later in the night or early in the morning, this could mean that these activities are completely unrelated to their espionage activities. FireEye reports that APT 41's activities are on average between 10:00 to 23:00
China Standard Time The time in China follows a single standard UTC offset, time offset of UTC+08:00, where Beijing is located, even though the country spans five geographical time zones. It is the largest sovereign nation in the world that officially observes only ...
, which is typical for Chinese tech workers who follow a "
996 Year 996 ( CMXCVI) was a leap year starting on Wednesday of the Julian calendar. Events By place Japan * February - Chotoku Incident: Fujiwara no Korechika and Takaie shoot an arrow at Retired Emperor Kazan. * 2 March: Emperor ...
" work schedule. APT 41 uses
digital certificates In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the validity of a Key authentication, public key. The certificate includes the public key and informati ...
obtained from video game developers and producers to sign their malware. Through the application of over 19 different digital certificates, they target both gaming and non-gaming organizations to avoid detection and ensure compatibility with the systems of the target. In 2012, a certificate from a South Korean game publisher was leveraged by APT 41 to sign the malware they use against other members of the gaming industry. In 2021 APT 41 launched a series of attacks against the illegal gambling industry in China.


U.S. Department of Justice

On September 16, 2020, the
United States Department of Justice The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the U.S. government that oversees the domestic enforcement of Law of the Unite ...
released previously sealed charges against 5 Chinese and 2 Malaysian citizens for hacking more than 100 companies across the world. These include firms involved in social-media, universities, telecommunications providers, software development, computer hardware, video-games, non-profit organizations, think tanks, foreign governments, and pro-democracy supporters in Hong Kong. The attacks were said to have involved the theft of code, code signing certificates, customer data and business information. Deputy Attorney General Jeffrey Rosen says that these actions involved having the hackers plant "back-doors" into software which allowed direct access to the systems of the software provider's company. Two of the Chinese hackers also conducted attacks on the US gaming industry, which involved at least 6 companies in New York, Texas,
Washington Washington most commonly refers to: * George Washington (1732–1799), the first president of the United States * Washington (state), a state in the Pacific Northwest of the United States * Washington, D.C., the capital of the United States ** A ...
, Illinois, California, and the United Kingdom. The
U.S. District Court The United States district courts are the trial courts of the U.S. federal judiciary. There is one district court for each federal judicial district. Each district covers one U.S. state or a portion of a state. There is at least one feder ...
for the District of Columbia distributed warrants calling for the seizure of accounts, servers, domain names, and web pages used by the hackers to conduct their operations. The
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
had the responsibility of executing the warrants as well as other private sector companies. Microsoft also developed technical measures to prevent continued access to computer systems of victims. The Federal Bureau of Investigation released a report containing technical information that can be used by private sector groups. The Justice Department congratulated the Malaysian government, particularly the Attorney General's Chambers of Malaysia and the
Royal Malaysia Police The Royal Malaysia Police (often abbreviated RMP) (; Jawi script, Jawi: ), is a (primarily) uniformed national and federal police force in Malaysia. The force is a centralised organisation, and its headquarters are located at Bukit Aman, Kuala ...
, in cooperating and aiding their arrest of the two Malay nationals, particularly since difficulties lie in arresting foreign hackers in general. The press release mentioned Microsoft, Google, Facebook and
Verizon Media Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
as groups which helped their investigation. The FBI also credited the Taiwanese
Ministry of Justice Investigation Bureau The Ministry of Justice Investigation Bureau (MJIB; zh, t=法務部調查局, p=Fǎwù Bù Diàochá Jú, poj=Hoat-bū-pō͘ Tiau-cha-kio̍k), is a Republic of China (Taiwan) agency responsible for criminal investigation and intelligence gatheri ...
, which helped provide information to US authorities after discovering APT 41 servers set up in California. Contrastingly, Rosen criticized the Chinese Communist Party in their inaction when it came to assisting the FBI for the arrest of the 5 Chinese hackers associated with APT 41. Rosen also claimed that the Chinese Communist Party was "making China safe for their cyber criminals" as they continue to assist them in espionage. Chinese Foreign Ministry spokesman
Wang Wenbin Wang Wenbin (; born April 1971) is a Chinese politician and diplomat who currently serves as the Chinese Ambassador to Cambodia. He was formerly a spokesman for the Ministry of Foreign Affairs (MFA), deputy director of the Foreign Ministry Info ...
says that the US uses its own cybersecurity issues to "attack China" through spreading false information, and political manipulation. This announcement was made during President Donald Trump's re-election campaign, associating the Chinese Communist Party with various cyber-espionage attacks. Alongside Russia and Iran, China was identified in a national threat assessment to the election.


Links with other groups

APT 41 has overlaps in activity with public reporting on other groups such as Barium and Winnti. In terms of technique, there are many overlaps in digital certificates and malware. According to FireEye, one of the most prominent similarities is the use of similar malware, particularly HIGHNOON, across various areas of activity. The use of the HIGHNOON malware was reported by FireEye and grouped under the APT 15 group (also known as Ke3chang, Vixen Panda, GREF, Playful Dragon). However, this was later found to be the work of multiple Chinese groups which share tools and strategies. A digital certificate distributed by video game company YNK Japan was used by APT 41, as well as other APT groups such as APT 17 and APT 20. A digital certificate allegedly from the
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
Certificate Authority In cryptography, a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. Thi ...
was also used by APT 41 and APT 40. Non-public malware used by APT 41 is linked to other alleged Chinese state-sponsored groups, which may indicate that APT 41 has shared resources with other groups. In 2024, Internet security experts believed that i-Soon is associated with APT 41 by researching their activities from leaked documents.


See also

* Red Apollo * APT40


Notes


References

{{authority control Cyberespionage units of the Ministry of State Security (China) Chinese advanced persistent threat groups Hacking in the 2010s Hacking in the 2020s Information technology in China Cybercrime in India China–India relations