G0030 Lotus Blossom
Lotus Blossom is a long-standing threat group largely targeting various entities in Asia since at least 2009. In addition to government and related targets, Lotus Blossom has also targeted entities such as digital certificate issuers.364
| Item | Value |
|---|---|
| ID | G0030 |
| Associated Names | DRAGONFISH, Spring Dragon, RADIUM, Raspberry Typhoon, Bilbug, Thrip |
| Version | 4.0 |
| Created | 31 May 2017 |
| Last Modified | 23 April 2025 |
| Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
| Name | Description |
|---|---|
| DRAGONFISH | 1 |
| Spring Dragon | 21 |
| RADIUM | 5 |
| Raspberry Typhoon | 5 |
| Bilbug | 6 |
| Thrip | 4 |
Techniques Used
| Domain | ID | Name | Use |
|---|---|---|---|
| enterprise | T1134 | Access Token Manipulation | Lotus Blossom has retrieved process tokens for processes to adjust the privileges of the launch process or other items.4 |
| enterprise | T1087 | Account Discovery | - |
| enterprise | T1087.001 | Local Account | Lotus Blossom has used commands such as net to profile local system users.4 |
| enterprise | T1087.002 | Domain Account | Lotus Blossom has used net commands and tools such as AdFind to profile domain accounts associated with victim machines and make Active Directory queries.46 |
| enterprise | T1560 | Archive Collected Data | - |
| enterprise | T1560.001 | Archive via Utility | Lotus Blossom has used WinRAR for compressing data in RAR format.46 |
| enterprise | T1560.003 | Archive via Custom Method | Lotus Blossom has used custom tools to compress and archive data on victim systems.4 |
| enterprise | T1543 | Create or Modify System Process | - |
| enterprise | T1543.003 | Windows Service | Lotus Blossom has configured tools such as Sagerunex to run as Windows services.4 |
| enterprise | T1074 | Data Staged | - |
| enterprise | T1074.001 | Local Data Staging | Lotus Blossom has locally staged compressed and archived data for follow-on exfiltration.4 |
| enterprise | T1482 | Domain Trust Discovery | Lotus Blossom has used tools such as AdFind to make Active Directory queries.6 |
| enterprise | T1083 | File and Directory Discovery | Lotus Blossom has used commands such as dir to examine the local filesystem of victim machines.4 |
| enterprise | T1112 | Modify Registry | Lotus Blossom has installed tools such as Sagerunex by writing them to the Windows registry.4 |
| enterprise | T1046 | Network Service Discovery | Lotus Blossom has used port scanners to enumerate services on remote hosts.6 |
| enterprise | T1588 | Obtain Capabilities | - |
| enterprise | T1588.002 | Tool | Lotus Blossom has used publicly-available tools such as a Python-based cookie stealer for Chrome browsers, Impacket, and the Venom proxy tool.4 |
| enterprise | T1090 | Proxy | - |
| enterprise | T1090.001 | Internal Proxy | Lotus Blossom has used publicly available tools such as the Venom proxy tool to proxy traffic out of victim environments.4 |
| enterprise | T1090.003 | Multi-hop Proxy | Lotus Blossom has used tools such as the publicly available HTran tool for proxying traffic in victim environments.4 |
| enterprise | T1012 | Query Registry | Lotus Blossom has run commands such as reg query HKLM\SYSTEM\CurrentControlSet\Services\[service name]\Parameters to verify if installed implants are running as a service.4 |
| enterprise | T1018 | Remote System Discovery | Lotus Blossom has used Ping to identify remote systems.6 |
| enterprise | T1539 | Steal Web Session Cookie | Lotus Blossom has used publicly-available tools to steal cookies from browsers such as Chrome.4 |
| enterprise | T1016 | System Network Configuration Discovery | Lotus Blossom has used commands such as ipconfig and netstat to gather network information on compromised hosts.4 |
| enterprise | T1016.001 | Internet Connection Discovery | Lotus Blossom has performed checks to determine if a victim machine is able to access the Internet.4 |
| enterprise | T1049 | System Network Connections Discovery | Lotus Blossom has used commands such as netstat to identify system network connections.4 |
| enterprise | T1047 | Windows Management Instrumentation | Lotus Blossom has used WMI to enable lateral movement.4 |
Software
References
-
Accenture Security. (2018, January 27). DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES. Retrieved November 17, 2024. ↩↩↩
-
Baumgartner, K.. (2015, June 17). The Spring Dragon APT. Retrieved February 15, 2016. ↩↩
-
Falcone, R., et al.. (2015, June 16). Operation Lotus Blossom. Retrieved February 15, 2016. ↩
-
Joey Chen, Cisco Talos. (2025, February 27). Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools. Retrieved March 15, 2025. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023. ↩↩
-
Symntec Threat Hunter Team. (2022, November 12). Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries. Retrieved March 15, 2025. ↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Falcone, R. and Miller-Osborn, J. (2016, February 3). Emissary Trojan Changelog: Did Operation Lotus Blossom Cause It to Evolve?. Retrieved February 15, 2016. ↩
-
Falcone, R. and Miller-Osborn, J.. (2015, December 18). Attack on French Diplomat Linked to Operation Lotus Blossom. Retrieved February 15, 2016. ↩