{"id":57705,"date":"2024-11-19T00:00:00","date_gmt":"2024-11-19T00:00:00","guid":{"rendered":"urn:uuid:25548714-aaa2-d531-a4bc-cf505751165b"},"modified":"2024-11-19T00:00:00","modified_gmt":"2024-11-19T00:00:00","slug":"spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/","title":{"rendered":"Spot the Difference: Earth Kasha&#8217;s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/EarthKasha:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/EarthKasha.png\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\">LODEINFO Since 2023<\/span><\/p>\n<p>In the new campaign starting in early 2023, Earth Kasha expanded their targets into Japan, Taiwan, and India. Based on the bias of the incident amount, while we believe that Japan is still the main target of Earth Kasha, we observed that a few high-profile organizations in Taiwan and India were targeted. The observed industries under attack are organizations related to advanced technology and government agencies.<\/p>\n<p>Earth Kasha has also employed different Tactics, Techniques, and Procedures (TTPs) in the Initial Access phase, which now exploits public-facing applications such as SSL-VPN and file storage services. We observed that vulnerabilities of enterprise products, such as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-28461\" target=\"_blank\" rel=\"noopener\">Array AG (CVE-2023-28461)<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-45727\" target=\"_blank\" rel=\"noopener\">Proself (CVE-2023-45727)<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-27997\" target=\"_blank\" rel=\"noopener\">FortiOS\/FortiProxy (CVE-2023-27997)<\/a>, were abused in the wild. Earth Kasha was changing these vulnerabilities to abuse from time to time. After gaining access, they deployed several backdoors in the victim&#8217;s network to achieve persistence. These include Cobalt Strike, LODEINFO, and the newly discovered NOOPDOOR, which we will describe later.<\/p>\n<h3><span class=\"body-subhead-title\">Observed TTPs in Post-Exploitation<\/span><\/h3>\n<p>Our comprehensive analysis of the activities in the Post-Exploitation phase has revealed that the primary motivation behind the attack was the theft of the victim\u2019s information and data. Earth Kasha first discovered Active Directory configuration and domain user information to achieve this goal using legitimate Microsoft tools, such as <i>csvde.exe<\/i>, <i>nltest.exe<\/i> and <i>quser.exe<\/i>. The following are actual commands used by the adversary.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">csvde.exe &nbsp;-f all.csv \u2013u<\/span><\/li>\n<li><span class=\"rte-red-bullet\">nltest.exe &nbsp;\/domain_trusts<\/span><\/li>\n<li><span class=\"rte-red-bullet\">&nbsp;quser.exe&nbsp;<\/span><\/li>\n<\/ul>\n<p>They then accessed the file server and tried to find documents related to the system information of the customer&#8217;s network by simply using &#8220;dir&#8221; commands recursively. Interestingly, upon checking on their activity, the operator might check the content of the documents manually. The stolen information may help the adversary find the next valuable target.<\/p>\n<p>Earth Kasha then performs several techniques to acquire credentials. One method uses their custom malware, MirrorStealer, to dump stored credentials in applications. MirrorStealer <a href=\"https:\/\/www.welivesecurity.com\/2022\/12\/14\/unmasking-mirrorface-operation-liberalface-targeting-japanese-political-entities\/\" target=\"_blank\" rel=\"noopener\">(originally reported by ESET<\/a>) is a credential dumper targeting multiple applications such as browsers (Chrome, Firefox, Edge and Internet Explorer), email clients (Outlook, Thunderbird, Becky, and Live Mail), Group Policy Preferences and SQL Server Management Studio.<\/p>\n<p>Since MirrorStealer may be designed to dump credentials on client machines, Earth Kasha used another way to dump OS credentials. We observed that the adversary abused <i>vssadmin<\/i> to copy registry hives and <i>ntds.dit<\/i> in the Active Directory server from volume shadow copy. The SAM registry hive contains the NTLM hash of local machine users, while <i>ntds.dit<\/i> contains the NTLM hash of all the domain users. The following are commands the adversary uses after creating a volume shadow copy.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">copy &nbsp;\\\\&lt;AD_SERVER_IP&gt;\\c$\\windows\\temp\\ntds.dit .<\/span><\/li>\n<li><span class=\"rte-red-bullet\">copy &nbsp;\\\\&lt;AD_SERVER_IP&gt;\\c$\\windows\\temp\\system .<\/span><\/li>\n<li><span class=\"rte-red-bullet\">copy &nbsp;\\\\&lt;AD_SERVER_IP&gt;\\c$\\windows\\temp\\sam .<\/span><\/li>\n<\/ul>\n<p>While we couldn\u2019t figure out the actual method they abused, we have observed that Earth Kasha successfully compromised domain admin in most cases. After compromising domain admin, they deployed backdoors (LODEINFO or NOOPDOOR) to several machines by copying components over SMB and abusing <i>schetasks.exe<\/i> or <i>sc.exe<\/i> to achieve lateral movement. The following are the adversary&#8217;s actual commands to deploy malicious components over admin shares.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">copy SfsDllSample.exe \\\\&lt;IP&gt;\\c$\\windows\\temp\\SfsDllSample.exe&nbsp;<\/span><\/li>\n<li><span class=\"rte-red-bullet\">copy SfsDll32.dll&nbsp;&nbsp;&nbsp;&nbsp; \\\\&lt;IP&gt;\\c$\\windows\\temp\\SfsDll32.dll<\/span><\/li>\n<li><span class=\"rte-red-bullet\">copy mssitlb.xml&nbsp; \\\\&lt;IP&gt;\\C$\\Windows\\system32\\UIAnimation.xml<\/span><\/li>\n<li><span class=\"rte-red-bullet\">copy ShiftJIS.dat \\\\&lt;IP&gt;\\C$\\Windows\\system32\\ComputerToastIcon.contrast-white.dat<\/span><\/li>\n<\/ul>\n<p>Once the intrusion progressed, Earth Kasha started to exfiltrate the stolen information. The adversary gathered data, including <i>ntds.dit<\/i>, SYSTEM, SAM registry hives and other interesting files on a single victim machine and compressed these files into a single archive using the <i>makecab<\/i> command. While we couldn\u2019t confirm how these data would be exfiltrated, it might be over the backdoor channel. Earth Kasha also exfiltrated interesting files in the victim network over the RDP session. They copied interesting files to the RDP source host over SMB (\u201ctsclient\u201d is an RDP source host).<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">\\\\tsclient\\C\\aaa\\All PC List.xlsx<\/span><\/li>\n<li><span class=\"rte-red-bullet\">\\\\tsclient\\C\\aaa\\All IP List.xlsx<\/span><\/li>\n<li><span class=\"rte-red-bullet\">\\\\tsclient\\C\\aaa\\Network Diagram.xlsx<\/span><\/li>\n<\/ul>\n<h3><span class=\"body-subhead-title\">Malware Analysis<\/span><\/h3>\n<p>In the previous campaign by Earth Kasha, LODEINFO has been their primary backdoor of choice. In the new campaign, however, we have observed several backdoors, such as Cobalt Strike, LODEINFO and previously undocumented NOOPDOOR. These backdoors were selectively used for each incident.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/k\/lodeinfo-campaign-of-earth-kasha.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>LODEINFO is a malware used in attacks targeting mainly Japan since 2019. Trend Micro has been tracking the group as Earth Kasha. We have identified a new campaign connected to this group with significant updates to their strategy, tactics, and arsenals. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57706,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9546,9510,9508,9509],"class_list":["post-57705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-apttargeted-attacks","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-endpoints","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spot the Difference: Earth Kasha&#039;s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spot the Difference: Earth Kasha&#039;s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-19T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/EarthKasha:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Spot the Difference: Earth Kasha&#8217;s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella\",\"datePublished\":\"2024-11-19T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/\"},\"wordCount\":773,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella.png\",\"keywords\":[\"Trend Micro Research : APT&amp;Targeted Attacks\",\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/\",\"name\":\"Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella.png\",\"datePublished\":\"2024-11-19T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella.png\",\"width\":973,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : APT&amp;Targeted Attacks\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-apttargeted-attacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Spot the Difference: Earth Kasha&#8217;s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/","og_locale":"en_US","og_type":"article","og_title":"Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-11-19T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/EarthKasha:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Spot the Difference: Earth Kasha&#8217;s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella","datePublished":"2024-11-19T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/"},"wordCount":773,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella.png","keywords":["Trend Micro Research : APT&amp;Targeted Attacks","Trend Micro Research : Articles, News, Reports","Trend Micro Research : Endpoints","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/","url":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/","name":"Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella.png","datePublished":"2024-11-19T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella.png","width":973,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/spot-the-difference-earth-kashas-new-lodeinfo-campaign-and-the-correlation-analysis-with-the-apt10-umbrella\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : APT&amp;Targeted Attacks","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-apttargeted-attacks\/"},{"@type":"ListItem","position":3,"name":"Spot the Difference: Earth Kasha&#8217;s New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57705"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57705\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57706"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}