Gao Qiang and Zheng Yanbin weren’t working alone. In this article we identify another member of the group.
fisherxp to baobeilong
Inspection of @fisherxp’s Twitter account shows that he follows 259 people and has 16 followers. One particularly interesting account, @baobeilong, both follows @fisherxp and is followed by it.
baobeilong’s interest in APT10 tools
‘baobeilong’ also has a GitHub account that shows a strong interest in Remote Access Trojans (RATs) including QuasarRAT and Trochilus, which baobeilong forked in 2015. JPCert reported in 2017 that Trochilus was used by APT10 as the basis for the RedLeaves malware. QuasarRAT was also used by APT10, as described in the FireEye blog post APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat.
Location in Tianjin
‘baobeilong’ has a Flickr profile including photos of family and a fire on Hualong Road in Tianjin.
Analysis by this blog leads us to conclude that the photo of the fire may have been taken from the Wanchun Meizuan Mansion building on the corner of Hualong Road and Xinkai Road in Tianjin from one of the floors occupied by flats. Readers will remember Xinkai Road as the address of the Laoying Baichen Instruments Equipment Co, associated with Gao Qiang in our previous article.Click to view slideshow.
baobeilong to xiaohong[.]org
‘baobeilong’ also has a fanfou.com account where the user provides a website address – xiaohong[.]org. A Chinese language blog also contains a posting using the e-mail address baobei[at]xiaohong.org, helping to confirm the connection between ‘baobei[long]’ and the xiaohong[.]org domain.
In 2007, the registration details for xiaohong[.]org were Zhang Shilong, Hedong, Yuyang Road No 121, Tianjin. He provided +8613116037711 as his phone number and the e-mail address atreexp[at]yahoo.com.cn.
The registration details were later updated on 08/07/2008 to include fax number +865925163169 and then on 01/06/2016 to add phone number +8615122188031. The e-mail address was changed at the same time to robin4700[at]foxmail.com.
Zhang Shilong to atreex[.]cn
Reverse WHOIS registration information for Zhang’s e-mail address atreexp[at]yahoo.com.cn shows that it was also associated with the domain atreex[.]cn. The Wayback Machine shows that this domain hosted a Chinese language blog relating to hacking and IT security topics between 2006 and 2007.
atreex[.]cn to fisherx[.]com
Completing the circle back to Gao Qiang / fisherxp, an article in 2006 on the atreex[.]cn blog provided a link to fisherx[.]com.
Zhang Shilong’s reaction to Cloud Hopper report
The domain xiaohong[.]org is particularly interesting because on 12/04/2017, the domain registration information was updated to ‘Domain Protection Services’, making it effectively anonymous. That date is significant – it was the week after the Cloud Hopper report on APT10 was released by PwC and BAE Systems.
In summary, APT10 hacker Gao Qiang of Tianjin, China has multiple connections to Zhang Shilong, another Chinese hacker from Tianjin. Zhang Shilong has independent links to APT10 tools and made an attempt to protect his identity immediately after the 2017 Cloud Hopper report.
Article Link: https://intrusiontruth.wordpress.com/2018/08/06/who-is-mr-zhang/