SPACEHOP Activity is conducted through commercially leased Virtual Private Servers (VPS), otherwise known as provisioned Operational Relay Box (ORB) networks. The network leveraged for SPACEHOP Activity enabled China-nexus cyber threat actors – such as APT5 and Ke3chang – to perform network reconnaissance scanning and vulnerability exploitation. SPACEHOP Activity has historically targeted entities in North America, Europe, and the Middle East.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1583 | .003 | Acquire Infrastructure: Virtual Private Server |
SPACEHOP Activity has used acquired Virtual Private Servers as control systems for devices within the ORB network.[1] |
Enterprise | T1190 | Exploit Public-Facing Application |
SPACEHOP Activity has enabled the exploitation of CVE-2022-27518 and CVE-2022-27518 for illegitimate access.[2][1] |
|
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
SPACEHOP Activity leverages a C2 framework sourced from a publicly-available Github repository for administration of relay nodes.[1] |
Enterprise | T1090 | .003 | Proxy: Multi-hop Proxy |
SPACEHOP Activity has routed traffic through chains of compromised network devices to proxy C2 communications.[1] |