<\/a><\/figure>\n\n\n\n<\/gwmw>The threat actor targets IP ranges in specific countries with more precision than a botnet, over 54% of the known targets are in the United States and China. The attackers use the ASN tool for reconnaissance, querying Shodan for data about targets without direct interaction. The group gathers information on open ports, vulnerabilities, and software\/hardware details. They also generate IPv4\/IPv6 CIDR blocks for specific countries using data from Marcel Bischoff\u2019s country-ip-blocks repository.<\/p>\n\n\n\n
The group was observed using Zmap for port scanning and the tool Nuclei as a vulnerability scanner.<\/p>\n\n\n\n