Skip to content

CrowdStrike Unveils New Chinese Cyber Espionage Group Liminal Panda

Liminal Panda's sophisticated tactics threaten global telecom networks. CrowdStrike shares steps to protect against this new threat.

there was a room in which people are sitting in the chairs,in front of a table looking into the...
there was a room in which people are sitting in the chairs,in front of a table looking into the laptop and doing something,beside them there are many flee xi in which different advertisements are present which different text.

CrowdStrike Unveils New Chinese Cyber Espionage Group Liminal Panda

CrowdStrike has identified a new Chinese state-sponsored cyber espionage group, Liminal Panda, responsible for multiple intrusion campaigns targeting telecommunications providers in South Asia and Africa since 2020. The group's motivations are believed to be signals intelligence (SIGINT) collection, not financial gain.

Liminal Panda has been active since at least 2020 and was likely behind intrusion campaigns previously attributed to LightBasin. The group's activity is characterized by abusing trust relationships and security policy gaps to access core infrastructure. It uses various tools for covert access, command and control, and data exfiltration, demonstrating extensive knowledge of telecom networks.

The group targets telecom providers in countries associated with China's Belt and Road Initiative, aiming to collect network telemetry and subscriber information. CrowdStrike attributes Liminal Panda's activity to a China-nexus based on similarities with other Chinese cyber espionage groups, such as Salt Typhoon, which have also targeted telecom providers in various regions.

To protect against Liminal Panda's activity, CrowdStrike recommends implementing complex password strategies, minimizing accessible services, enforcing internal access controls, logging SSH connections, verifying iptables rules, and employing file integrity checking. The discovery of Liminal Panda underscores the ongoing threat posed by state-sponsored cyber espionage groups targeting critical infrastructure.

Read also:

Latest