Chinese hacking group Aoqin Dragon quietly spied orgs for a decade
Named Aoqin Dragon, the hacking group is focused on cyber-espionage, targeting government, education, and telecommunication organizations based in Singapore, Hong Kong, Vietnam, Cambodia, and Australia. Aoqin Dragon has employed three distinct infection chains since it was first spotted, according to SentinelLabs. Most recent infection chain used by Aoqin Dragon (SentinelLabs)Aoqin Dragon's toolset SentinelLabs has identified two different backdoors used by the particular threat group, Mongall and a modified version of Heyoka. Considering that its activities align with Chinese government political interests, it's almost certain that Aoqin Dragon will continue its cyber-espionage operations, improving its detection avoidance and switching to new evasion tactics.
Read more about it: here