ETDA ThaiCERT
Report
Search
Home > List all groups > Siesta

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Siesta

NamesSiesta (Trend Micro)
CountryChina China
MotivationInformation theft and espionage
First seen2014
Description(Trend Micro) In the past few weeks, we have received several reports of targeted attacks that exploited various application vulnerabilities to infiltrate various organizations. Similar to the Safe Campaign, the campaigns we noted went seemingly unnoticed and under the radar.

(FireEye) FireEye recently looked deeper into the activity discussed in TrendMicro’s blog and dubbed the “Siesta” campaign. The tools, modus operandi, and infrastructure used in the campaign present two possibilities: either the Chinese cyber-espionage unit Comment Crew, APT 1 is perpetrating this activity, or another group is using the same tactics and tools as the legacy APT1.

The Siesta campaign reinforces the fact that analysts and network defenders should remain on the lookout for known, public indicators and for shared attributes that allow security experts to detect multiple actors with one signature.
ObservedSectors: Defense, Energy, Financial, Government, Healthcare, Media, Telecommunications, Transportation.
Tools usedPoison Ivy.
Information<https://blog.trendmicro.com/trendlabs-security-intelligence/the-siesta-campaign-a-new-targeted-attack-awakens/>
<https://www.fireeye.com/blog/threat-research/2014/03/a-detailed-examination-of-the-siesta-campaign.html>

Last change to this card: 15 April 2020

Download this actor card in PDF or JSON format

Previous: SideWinder, Rattlesnake
Next: Silence, Contract Crew

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key