Lancefly

MISP
Type:
Unknown
Country:
Unknown
First seen:
Unknown
Details:

Lancefly targets government, aviation, and telecom organizations in South and Southeast Asia. They use a custom backdoor named Merdoor, developed since 2018, and employ various tactics to gain access, including phishing emails, SSH credential brute-forcing, and exploiting server vulnerabilities. Additionally, Lancefly has been observed using a newer version of the ZXShell rootkit and tools like PlugX and ShadowPad RAT, which are typically associated with Chinese-speaking APT groups.

Metadata
ID: 445
Created: 13/01/2026 17:48
Updated: 07/03/2026 16:00