【CyCraft Monthly Intelligence】RedNovember Expansion: Leveraging Pantegana and Cobalt Strike to Infiltrate Global Government and Defense Supply Chains

Threat and Impact

RedNovember, previously known as TAG-100 and highly overlapped with Storm-2077, has been confirmed as a state-sponsored cyber-espionage group operating under Chinese government’s support. The group targets high-profile governments, IGOs, and private entities globally, employing the Go-based backdoor Pantegana alongside open-source tools such as Cobalt Strike and SparkRAT for reconnaissance, initial access, and subsequent intrusions.

Between June 2024 and July 2025, RedNovember extended its targets to organizations in the defense, aerospace, space agency, and legal sectors. The group has demonstrated a capability to compromise edge devices to gain initial access, aiming perimeter security platforms including SonicWall, Cisco ASA, F5 BIG-IP, and Palo Alto Networks GlobalProtect.

Analyst Perspective

RedNovember victims are mainly the aerospace, defense, and government sectors. One of the Taiwanese victim locates at a military air base that also serves as a semiconductor RD facility, suggesting the attacker's intent is of national strategic significance. Furthermore, the timing of attacks coincide with large-scale Chinese military exercises against Taiwan, indicating a simultaneous stress test of Taiwan's digital defenses while simulating cyber warfare capabilities.

Incident Description

RedNovember utilizes a dual strategy to lower their entry barrier by weaponizing PoC exploits and incorporating open-source post-exploitation frameworks like Pantegana. This approach enables less technically sophisticated actors to launch attacks while allowing advanced groups to rapidly scale up operations. The organization has employed these tools for reconnaissance against multiple sensitive targets worldwide and may have achieved successful intrusions across government agencies, defense contractors, IGOs, law firms, and media organizations.

Figure 1  The distribution of RedNovember's reconnaissance and intrusion across various countries between June 2024 and May 2025. (Source: Recorded Future)

Technical Details

Reconnaissance

RedNovember extensively targets edge devices to gain initial access. Targets include SonicWall, Cisco ASA, F5 BIG-IP, Palo Alto Networks GlobalProtect, Sophos SSL VPN, and Fortinet FortiGate. The group has focused its reconnaissance on organizations in the government, defense, aerospace, and technology sectors across the United States, Taiwan, South Korea, and Panama.

Resource Development

RedNovember leverages the open-source backdoors Pantegana and Cobalt Strike, delivered malicious payload via SparkRAT. They use LESLIELOADER to load these tools into memory to evade any defense. Additionally, they utilize commercial VPN services like ExpressVPN and Warp VPN to manage their Command and Control (C2) infrastructure.

Initial Access

RedNovember's primary method for gaining initial access is by exploiting vulnerabilities in boundary-layer devices such as firewalls, VPNs, and email servers. They focus on newly disclosed edge device vulnerabilities to establish a foothold within the target organization for deeper exploitation and data theft.

Execution

The group uses Cobalt Strike and SparkRAT to execute malicious code, enabling in-memory execution on both Windows and Linux hosts. RedNovember deploys PoC attacks and weaponized tools to issue commands and maintain persistence over compromised systems.

Command and Control (C2)

RedNovember uses Pantegana to establish encrypted HTTPS C2 channels for transferring files, collecting system fingerprint data, and executing commands. Furthermore, they rely on Cobalt Strike for C2 communication and post-exploitation activities, reinforcing control over the compromised systems.

Overall, RedNovember conducts cyber-espionage attacks against high-value organizations globally by combining open-source tools, weaponized PoC programs, and customized loaders. The group strategically targets edge devices as the initial intrusion vector and maintains long-term persistence through covert Command and Control (C2) communication, demonstrating a highly mature attack capability that poses a persistent and significant threat to the global security landscape.

Mitigation

In response to RedNovember's diverse tactics, enterprises must adopt multi-faceted measures encompassing detection, prevention, and response strategies.

Collect Related Indicators of Compromise (IoCs)

Integrate relevant IoCs associated with RedNovember's activities to preemptively defend their attacks.

Detect and Block Malicious Infrastructure

Proactively monitor and block malicious infrastructure linked to RedNovember, such as the C2 servers for Pantegana, SparkRAT, and Cobalt Strike.

Patch Vulnerabilities

Prioritize patching high-risk and actively exploited vulnerabilities, especially those affecting externally facing perimeter devices, to prevent exploitation by groups like RedNovember.

Configure Network Defense Mechanisms

Deploy Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and other network defenses. Refer to the IoC chaper for external IPs and domains to generate alerts and block connections to known RedNovember C2 infrastructure.

Regularly Audit External-Facing Devices

Conduct routine audits of all external connection and boundary devices to reduce exposed attack surfaces. Disable unnecessary interfaces or portals and restrict devices to essential services required for business operations.

Conclusion

By adhering to these mitigation strategies, enterprises can strengthen their resilience against threat actors like RedNovember and reduce the risk of cyber-espionage targeting the government, defense, and technology sectors. Stay alerted, monitor proactively, and deploy timely incident response are critical elements for establishing an effective cybersecurity defense.

Reference
  1. RedNovember Targets Government, Defense, and Technology Organizations
  2. RedNovember Hackers Breach Government and Technology Networks to Install Backdoors
  3. Chinese Cyberespionage Group RedNovember Targets Global Defense and Government Organizations
  4. Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign
  5. RedNovember Hackers Targeting Government and Tech Organizations to Install Backdoor

IoCs (Indicator ofCompromise)

Domain

aeifile[.]offiec[.]us[.]kg

citrix[.]offiec[.]us[.]kg

cna[.]offiec[.]us[.]kg

download[.]offiec[.]us[.]kg

gp[.]offiec[.]us[.]kg

login[.]offiec[.]us[.]kg

test[.]offiec[.]us[.]kg

vpn[.]offiec[.]us[.]kg

vpn1[.]offiec[.]us[.]kg

RedNovemberPantegana C2 IP Addresses

45[.]61[.]187[.]124

198[.]98[.]50[.]218

198[.]98[.]53[.]163

198[.]98[.]61[.]155

209[.]141[.]37[.]254

205[.]185[.]126[.]208

205[.]185[.]124[.]24

209[.]141[.]42[.]131

209[.]141[.]46[.]83

209[.]141[.]57[.]116

RedNovemberCobalt Strike C2 IP Address

47[.]103[.]218[.]35

RedNovemberCobalt Strike C2 URLs

hxxp://47[.]103[.]218[.]35/pixel

hxxp://47[.]103[.]218[.]35/GSjY

File Hash

   
Name   
   
SHA256   
   
SHA1   
   
MD5   
   
LESLIELOADER   
   
06e87a03507213322d876b459194021f876ba90f85c5faa401820954045cd1d2   
   
6d6aead4bca7e998d418f64f90870b338864b2b3   
   
627d33dd1cccb8264efe53325b172c56   
   
LESLIELOADER   
   
134ed0407956ff1ac59f38e89742e357cc3be565cbaff18b424ed1bcfd130978   
   
0e1db4ecd701ba1e5cb07e9afd436cf1a225d131   
   
ffa472e270d16a3a455f5ee53ed448e5   
   
LESLIELOADER   
   
2bee2cc42322e928bfa0650c5416b14bc0200f2d1156304179d63982baa835dc   
   
e0d19dc35b61e899ef0c1c380050dd1c1299b330   
   
30eebd59eb2b65fe6f003a8c8b3ac0f4   
   
LESLIELOADER   
   
8679a25c78e104c6e74996b75882e378f420614fe1379ee9c1e266a11ffa096d   
   
e682a99970c2527619500e06332c5d4d46cd1200   
   
eaec24a149b86b3762f7e24325190f7a   
   
ZIP file   
   
675874ac8fbe66e76244759ae398a4d30da84ef2435a1384c4be549ca9eba18b   
   
aca56b775c57501285ecb8af8af60d2a2b4bbcfb   
   
23e2f281d2fb4a79c2cd2b87e2dab17d   
   
PDF lure   
   
1e37efcd3cd647e6ce5414ae8e353ca690c2d3f7a701a1cc2ec29a4813f5c90b   
   
b93df34a70096623a23c179710c5d90e402e1057   
   
c709a94e31c19dd7e1536153bd8bb8b1   
   
Malicious Follina Word document   
   
9a1077f57bac5610d44ac46a8958dd5469522a3db466f164f4dfeada73847b79   
   
6e03149f44f04da161d893f8c1ee27328faea5fa   
   
fe58574aa5876c7baf5b96bae1d515d0   
   
Malicious Follina Word document   
   
dba860617762bc713771de351026eb683546b37489fa0359064948f263438030   
   
760db2765f210a994a908a050cf5b12cce62f3b3   
   
e5eb524308a58190d9feb2244d187eb8   

About CyCraft

CyCraft is a cybersecurity company founded in 2017, focusing on autonomous AI technology. Headquartered in Taiwan, it has subsidiaries in Japan and Singapore. CyCraft provides professional cybersecurity services to government agencies, police and defense forces, banks, and high-tech manufacturers throughout the Asia-Pacific region. It has received strong backing from the CID Group and Pavilion Capital, a Temasek Holdings Private Limited subsidiary.

Subscribe to CyCraft's Newsletter

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking this button, you agree to CyCraft's privacy policy and consent to CyCraft using the information you provided to contact you. You may cancel your subscription at any time.