Nihon Cyber Defence

NCD Cyber Threat Intelligence: Gelsemium APT Group ​

A China-linked, cyber threat to Japanese companies​

Gelsemium, a Chinese-linked Advanced Persistent Threat (APT) group active since 2014, poses a significant cyber threat to organizations in East Asia, including Japan. This group conducts sophisticated cyberespionage campaigns, leveraging custom malware to infiltrate and exfiltrate sensitive data. Japanese companies, given their technological and industrial prominence, are prime targets.

The Gelsemium Playbook

Gelsemium is espionage-focused and leverages custom malware such as WolfsBane, a Linux-based tool, and FireWood, which is linked to the older Project Wood backdoor. These tools are designed to steal sensitive information, exploit web vulnerabilities, and evade detection using advanced techniques like rootkits. Their emphasis on Linux systems demonstrates their adaptability and ability to exploit emerging vulnerabilities. Gelsemium’s activities pose significant risks, including intellectual property theft, operational disruptions, and reputational damage. Their multi-stage attacks typically begin by targeting publicly accessible servers, then spread laterally within networks to compromise critical systems.

Gelsemium is potentially connected to the Blackwood APT group, based on the correlation between the FireWood Backdoor and Project Wood. Blackwood, active since at least 2018, has conducted cyberespionage operations targeting individuals and organizations in China, Japan, and the United Kingdom. Known for using AiTM (Adversary-in-the-Middle) attacks, Blackwood intercepts network communications to steal credentials, forge encryption keys, and facilitate further attacks. These techniques have been used to deploy the NSPX30 implant by exploiting update mechanisms of software such as Tencent QQ, WPS Office, and Sogou Pinyin. Given Blackwood’s history of targeting Japan, the Gelsemium APT group may continue to pose a significant threat to the region.

Threat Actor Attribution Chart​

Threat Actor Attribution Chart​

Here are some proactive steps to defend against Gelsemium:​

  • Secure Linux Systems: Regularly patch vulnerabilities, strengthen authentication, and deploy Linux-specific intrusion detection systems.
  • Enhance Web Security: Identify and fix vulnerabilities, enforce secure coding practices, and use Web Application Firewalls (WAF).
  • Implement Advanced Endpoint Security: Deploy Endpoint Detection and Response (EDR) tools and monitor server environments.
  • Educate Employees: Train staff to recognize phishing and social engineering tactics.

The Gelsemium threat underscores the need for robust cyber security measures. These risks are manageable with the right defences. By investing in proactive strategies, organizations can safeguard their assets and maintain their competitive edge in an increasingly hostile digital landscape.

Nihon Cyber Defence provides localized, industry-specific solutions to protect against threats like Gelsemium. Partner with NCD for expert guidance to fortify defences against even the most advanced cyber threats.

Kenichi-Terashita
Kenichi Terashita

Chief Threat Intelligence Officer @ Nihon Cyber Defence

With over 20 years of security expertise as an engineer and consultant, Terashita leads a specialized team analysing global cyber threats.

Edit Template

Cyber Maturity Assessment

Nihon Cyber Defence (NCD) offers comprehensive Cyber Maturity Assessments designed to evaluate an organisations current cyber security capabilities, identify areas for improvement, and develop a strategic roadmap to enhance overall security posture.

Cyber Security Framework (NIST)

National Institute of Standards and Technology

NIST Framework Graphic

Cyber Assessment Framework (CAF)

National Cyber Security Centre

CAF Framework Graphic
Edit Template

More from NCD​

The Ransomware Dilemma

Mandatory reporting and ransom payment bans sound tough on cybercrime, but will they actually work? Businesses need a smarter approach to ransomware resilience. Here’s what needs to change...

Lessons from the UK CyberFirst Program for Japan

Japan can bridge its cybersecurity talent gap by leveraging public-private partnerships, corporate sponsorships, and government-backed education programs, inspired by CyberFirst...

Educational Strategies and Initiatives to Address the Cyber security Talent Gap

Learn how education programs and strategic initiatives are addressing Japan’s cybersecurity workforce gap...

How AI is Revolutionizing Modern Warfare: Key Insights

Explore how AI is transforming the battlefield, from autonomous drones to cyberwarfare tactics. Understand key trends shaping the future of global defense...

Leadership & Cyber Resilience | Vol. II

North Korean hackers from Lazarus stole $1.4B in crypto from Bybit, exploiting cold wallet security flaws. Learn how the attack happened & what it means...

Japan’s Growing Cyber Security Talent Gap and Its Impacts

Japan faces a cyber security talent shortage of 110,000 experts. Explore the challenges, impacts, and solutions to bridge this critical skills gap...

Preparing for Active Cyber Defense (ACD)

Japan’s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the...

Nihon Cyber Defence and Fivecast Partner to Enhance Cyber Threat Intelligence for Japan

The collaboration combines Fivecast’s advanced AI-powered OSINT technology with NCD’s expertise in cyber threat intelligence and Japanese cyber security needs, delivering actionable intelligence...

Navigating Cyber Incident Response 

Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this...
Edit Template