threatintel
actor tracker
All actors

Naikon

naikon · primary source: MITRE · first observed 2009
CN · ChinaState-sponsoredModerate confidencelast cited Apr 26, 2021 · 5y ago

PRC state-sponsored intrusion set publicly attributed by ThreatConnect and Defense Group Inc. to the People's Liberation Army Unit 78020 (Chengdu Military Region Second Technical Reconnaissance Bureau), primarily targeting ASEAN-region military, diplomatic, and government organizations. One of the longest-running publicly-documented PRC intrusion sets — Bitdefender re-disclosed sustained operations against ASEAN governments through 2020 using the Aria-body backdoor.

Aliases

APT30MITREOverride PandaCrowdStrikeLotus PandaOther

Motivations

espionage

Target sectors

governmentmilitarydiplomatic

Target countries

IDVNPHTHMMMYSGLAKHAU

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Naikon
  • China
  • espionage
Infrastructure
  • spool.jtjewifyn.com
  • blog.toptogear.com
Victim
  • government
  • military
  • diplomatic
  • ID
  • VN
  • +1 more

MITRE ATT&CK techniques

Timeline

4 events
  1. ReportMedium2021-04-27·Bitdefender

    Bitdefender details Naikon RainyDay and Nebulae backdoors used against Southeast Asian militaries

    Bitdefender's Cyber Threat Intelligence Lab published 'NAIKON — Traces from a Military Cyber-Espionage Operation', documenting a June 2019 to March 2021 campaign against military organisations in Southeast Asia. The operators used the Aria-body loader and the Nebulae backdoor for initial compromise and added the RainyDay backdoor starting in September 2020, abusing DLL side-loading against legitimate binaries from McAfee, Sandboxie, Outlook, and Quick Heal to evade detection.

    reportrainydaynebulaesoutheast-asia
  2. ReportMedium2020-05-07·Check Point Research

    Check Point exposes Naikon's Aria-body backdoor in five-year APAC government campaign

    Check Point Research published 'Naikon APT: Cyber Espionage Reloaded', detailing a previously undocumented backdoor called Aria-body deployed against ministries of foreign affairs, science and technology, and government-owned companies in Australia, Indonesia, the Philippines, Vietnam, Thailand, Myanmar, and Brunei. Check Point attributed the activity to Naikon via shared infrastructure with prior Naikon campaigns, debug-string overlap with the XsFunction backdoor, and reuse of the djb2 hashing algorithm.

    reportaria-bodyapacespionage
  3. ReportInfo2017-05-31·MITRE

    MITRE ATT&CK adds Naikon as Group G0019

    MITRE published the Naikon group entry (G0019) in ATT&CK, characterising the actor as a state-sponsored Chinese cyber-espionage group active since at least 2010 and primarily targeting government, military, and civil organisations in Southeast Asia along with international bodies including the UN Development Programme and ASEAN. The page consolidates associated software including Aria-body, RainyDay, Nebulae, SslMM, WinMM, and RARSTONE.

    referencemitre-attackasean
  4. ReportMedium2015-09-23·ThreatConnect / Defense Group Inc.

    ThreatConnect and Defense Group publish Project CAMERASHY attributing Naikon to PLA Unit 78020

    ThreatConnect and Defense Group Inc. released Project CAMERASHY, attributing the Naikon APT to the Chinese People's Liberation Army Chengdu Military Region Second Technical Reconnaissance Bureau (Military Unit Cover Designator 78020) based on technical analysis of intrusion infrastructure and native-language research that linked the greensky27.vicp.net handle to Ge Xing, an officer assessed to be a member of Unit 78020. The report documented five-plus years of espionage against South China Sea claimant states and ASEAN.

    reportattributionpla-unit-78020south-china-sea

Indicators of compromise

4 indicators
csv
TypeValueFirst seenSource
SHA-256
78782a24805b52713cb63ba3cad2569b905edea96ca3609f8464f1b7c1ba05dc
family · RainyDay
RainyDay rdmin.src encrypted payload sample (C2 asp.asphspes.com) published in Bitdefender's 2021 Naikon whitepaper IOC section.
Apr 26, 2021Bitdefender
SHA-256
4cab6bf0b63cea04c4a44af1cf25e214771c4220ed48fff5fca834efa117e5db
family · Aria-body
Aria-body backdoor payload sample published in Appendix C of Check Point's 2020 Naikon report.
May 6, 2020Check Point Research
Domain
spool[.]jtjewifyn[.]com
family · Aria-body
Naikon Aria-body command-and-control domain identified by Check Point Research in the 2020 'Cyber Espionage Reloaded' campaign against APAC government targets.
May 6, 2020Check Point Research
Domain
blog[.]toptogear[.]com
family · Aria-body
Naikon Aria-body C2 domain listed in Check Point's 2020 Aria-body IOC appendix.
May 6, 2020Check Point Research

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Naikon — actor profile. Retrieved from https://threatintel.local/actors/naikon

latest cited activity · 2021-04-27 · 4 cataloged indicators