Tuesday, April 22, 2025
HomeAPTI-SOON’s 'Chinese Fishmonger' APT Targets Government Entities and NGOs

I-SOON’s ‘Chinese Fishmonger’ APT Targets Government Entities and NGOs

Published on

SIEM as a Service

Follow Us on Google News

In a recent development, the U.S. Department of Justice unsealed an indictment against employees of the Chinese contractor I-SOON, revealing their involvement in multiple global espionage operations.

These operations are attributed to the FishMonger APT group, which is believed to be I-SOON’s operational arm.

The group, also known as Earth Lusca, TAG-22, Aquatic Panda, or Red Dev 10, has been linked to a series of sophisticated cyberattacks targeting governments, NGOs, and think tanks across Asia, Europe, and the United States.

- Advertisement - Google News

Operation FishMedley: A Global Espionage Campaign

Operation FishMedley, a campaign identified in 2022, involved the compromise of seven organizations.

The attackers employed implants such as ShadowPad, SodaMaster, and Spyder, which are commonly used by China-aligned threat actors.

ShadowPad, a modular backdoor, was used in conjunction with ScatterBee packing, while Spyder, a modular implant, was detected at several victim sites.

SodaMaster, a backdoor initially associated with APT10, was also identified, indicating potential sharing among multiple China-aligned groups.

During the campaign, attackers gained privileged access within targeted networks, often using compromised domain administrator credentials.

At one victim site, they deployed implants via an admin console, while at another, they used Impacket to deliver and laterally move malware.

The attackers conducted manual reconnaissance using tools like quser.exe and wmic.exe, and they dumped the LSASS process to obtain credentials.

According to the Report, they also saved registry hives to extract additional secrets.

The toolset used by FishMonger includes ShadowPad, Spyder, Cobalt Strike, FunnySwitch, SprySOCKS, and the BIOPASS RAT.

Chinese Fishmonger
Names of FishMonger / I‑SOON members

ShadowPad was configured to inject into Windows Media Player or svchost.exe, while Spyder used AES-CBC encryption with a hardcoded key.

SodaMaster loaders abused legitimate executables via DLL side-loading, implementing a password stealer for Firefox in some cases.

Legal and Technical Implications

The indictment by the U.S. Department of Justice marks a significant legal response to these espionage activities.

Technically, the campaign highlights the sophisticated tactics employed by FishMonger, including the use of watering-hole attacks and living-off-the-land binaries.

The group’s ability to operate under different names and adapt its toolset underscores the evolving nature of cyber threats from China-aligned actors.

As cybersecurity continues to be a critical concern for governments and organizations worldwide, understanding these operations is crucial for developing effective defense strategies.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...