RedEcho

RedEcho is a People’s Republic of China-related threat actor associated with long-running intrusions in Indian critical infrastructure entities. RedEcho overlaps with various other PRC-linked threat groups, such as APT41, and is linked to ShadowPad malware use through shared infrastructure.[1][2]

ID: G1042
Version: 1.0
Created: 21 November 2024
Last Modified: 13 March 2025

Techniques Used

Domain ID Name Use
Enterprise T1583 .001 Acquire Infrastructure: Domains

RedEcho has registered domains spoofing Indian critical infrastructure entities.[1]

Enterprise T1071 .001 Application Layer Protocol: Web Protocols

RedEcho network activity is associated with SSL traffic via TCP 443 and proxied HTTP traffic over non-standard ports.[1]

Enterprise T1568 Dynamic Resolution

RedEcho used dynamic DNS domains associated with malicious infrastructure.[1]

Enterprise T1573 .002 Encrypted Channel: Asymmetric Cryptography

RedEcho uses SSL for network communication.[1]

Enterprise T1571 Non-Standard Port

RedEcho has used non-standard ports such as TCP 8080 for HTTP communication.[1]

Software

References