Naikon
PRC state-sponsored intrusion set publicly attributed by ThreatConnect and Defense Group Inc. to the People's Liberation Army Unit 78020 (Chengdu Military Region Second Technical Reconnaissance Bureau), primarily targeting ASEAN-region military, diplomatic, and government organizations. One of the longest-running publicly-documented PRC intrusion sets — Bitdefender re-disclosed sustained operations against ASEAN governments through 2020 using the Aria-body backdoor.
Aliases
Motivations
Target sectors
Target countries
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
4 events- ReportMedium2021-04-27·Bitdefender
Bitdefender details Naikon RainyDay and Nebulae backdoors used against Southeast Asian militaries
Bitdefender's Cyber Threat Intelligence Lab published 'NAIKON — Traces from a Military Cyber-Espionage Operation', documenting a June 2019 to March 2021 campaign against military organisations in Southeast Asia. The operators used the Aria-body loader and the Nebulae backdoor for initial compromise and added the RainyDay backdoor starting in September 2020, abusing DLL side-loading against legitimate binaries from McAfee, Sandboxie, Outlook, and Quick Heal to evade detection.
reportrainydaynebulaesoutheast-asia - ReportMedium2020-05-07·Check Point Research
Check Point exposes Naikon's Aria-body backdoor in five-year APAC government campaign
Check Point Research published 'Naikon APT: Cyber Espionage Reloaded', detailing a previously undocumented backdoor called Aria-body deployed against ministries of foreign affairs, science and technology, and government-owned companies in Australia, Indonesia, the Philippines, Vietnam, Thailand, Myanmar, and Brunei. Check Point attributed the activity to Naikon via shared infrastructure with prior Naikon campaigns, debug-string overlap with the XsFunction backdoor, and reuse of the djb2 hashing algorithm.
reportaria-bodyapacespionage - ReportInfo2017-05-31·MITRE
MITRE ATT&CK adds Naikon as Group G0019
MITRE published the Naikon group entry (G0019) in ATT&CK, characterising the actor as a state-sponsored Chinese cyber-espionage group active since at least 2010 and primarily targeting government, military, and civil organisations in Southeast Asia along with international bodies including the UN Development Programme and ASEAN. The page consolidates associated software including Aria-body, RainyDay, Nebulae, SslMM, WinMM, and RARSTONE.
referencemitre-attackasean - ReportMedium2015-09-23·ThreatConnect / Defense Group Inc.
ThreatConnect and Defense Group publish Project CAMERASHY attributing Naikon to PLA Unit 78020
ThreatConnect and Defense Group Inc. released Project CAMERASHY, attributing the Naikon APT to the Chinese People's Liberation Army Chengdu Military Region Second Technical Reconnaissance Bureau (Military Unit Cover Designator 78020) based on technical analysis of intrusion infrastructure and native-language research that linked the greensky27.vicp.net handle to Ge Xing, an officer assessed to be a member of Unit 78020. The report documented five-plus years of espionage against South China Sea claimant states and ASEAN.
reportattributionpla-unit-78020south-china-sea
Indicators of compromise
4 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| SHA-256 | family · RainyDay RainyDay rdmin.src encrypted payload sample (C2 asp.asphspes.com) published in Bitdefender's 2021 Naikon whitepaper IOC section. | Apr 26, 2021 | Bitdefender |
| SHA-256 | family · Aria-body Aria-body backdoor payload sample published in Appendix C of Check Point's 2020 Naikon report. | May 6, 2020 | Check Point Research |
| Domain | family · Aria-body Naikon Aria-body command-and-control domain identified by Check Point Research in the 2020 'Cyber Espionage Reloaded' campaign against APAC government targets. | May 6, 2020 | Check Point Research |
| Domain | family · Aria-body Naikon Aria-body C2 domain listed in Check Point's 2020 Aria-body IOC appendix. | May 6, 2020 | Check Point Research |
Related actors
shared ATT&CK techniques- RU · RussiaGamaredon4 shared techniques
- CN · ChinaMustang Panda4 shared techniques
- IR · IranAPT393 shared techniques
- KP · DPRKLazarus Group3 shared techniques
- KP · DPRKAPT372 shared techniques
- CN · ChinaAPT412 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). Naikon — actor profile. Retrieved from https://threatintel.local/actors/naikon