top of page
Image by Tran Phu

OceanLotus

​​OceanLotus (also tracked as APT32, SeaLotus, Cobalt Kitty, APT-C-00) is a Vietnam-based cyber espionage group active since at least 2012. The group is known for sophisticated spear-phishing campaigns, watering holes, supply chain intrusions, and custom malware families. Its operations target foreign governments, journalists, NGOs, multinational corporations, and Vietnamese dissidents, aligning with the interests of the Vietnamese state.

OceanLotus has deployed advanced malware like Ratsnif, KerrDown, Denes, and Cobalt Strike loaders, alongside custom backdoors for macOS and Windows. The group is notorious for cross-platform toolchains, compromising media and NGO networks, and long-term persistent espionage campaigns across Southeast Asia and beyond.

OceanLotus

Aliases: OceanLotus, APT32, SeaLotus, Cobalt Kitty, APT-C-00

​

Origin:  Vietnam
 

Years Active: 2012 – Present

 

Motivation: State-linked espionage, domestic surveillance, economic intelligence.

 

Primary Targets: Foreign governments (esp. SE Asia, China, Laos, Cambodia), multinational firms, NGOs, journalists, Vietnamese dissidents, overseas diaspora

​

Tactics, Techniques, and Procedures (TTPs)
 

Initial Access: Spear-phishing with malicious docs (Office macros, RTF, LNK); watering hole attacks; supply chain compromises

​​

Malware Families: KerrDown, Denes, Ratsnif, KrDrop, Cobalt Strike loaders, macOS backdoors (OSX.OceanLotus), PhantomNet

​​

Persistence & Evasion: Custom loaders, DLL side-loading, encrypted payload staging, VM/sandbox detection

​​

Post-Exploitation: Credential theft, keylogging, screen capture, data exfiltration to custom C2

​​

C2: HTTPS, DNS tunneling, cloud services, compromised sites

 

Notable Campaigns & Operations
​​

2014–15 – Early ops: Targeted Chinese entities related to South China Sea disputes

2016 – Media & NGOs: Campaigns against Vietnamese activists, independent journalists, and NGOs

2017 – Cobalt Kitty: Large supply chain attack against Asian corporations

2018 – ASEAN & Foreign Ministries: Targeted Cambodia ahead of elections; also attacks on Laos

2019 – Automotive & Manufacturing: Attacks on foreign corporations for economic espionage

2020 – China-targeted ops: Phishing campaigns against Chinese government orgs, including COVID-19 response teams

2021 – macOS Backdoors: OceanLotus malware uncovered targeting dissidents on Mac devices

2022–24 – Low visibility: Activity observed but more fragmented, still targeting journalists and regional diplomacy

​

 Infrastructure & IOCs

​

<Currently Compiling >

​

Regional & Geopolitical Context

Tied to Vietnamese state interests:

 

Surveillance of dissidents, journalists, activists

 

Espionage related to South China Sea disputes

 

Monitoring of Cambodian and Laotian politics

 

Economic espionage targeting foreign corporations

 

Distinct from PRC-linked APTs: OceanLotus reflects Hanoi’s intelligence priorities

​​

​​

​​​

Threat Assessment

 

Sophistication: High – custom cross-platform malware, long-term intrusions, supply chain compromises

Current Activity: Still active as of 2025, though less noisy and more targeted

Risk Profile: Regional governments, NGOs, human rights activists, and global companies with operations in Vietnam

​

​

​
References

FireEye / Mandiant APT32 reports (2017, 2019)

ESET research on OceanLotus macOS malware (2019–2021)

Amnesty International technical reports (2018–2020) on Vietnamese activist targeting

Trend Micro coverage of Ratsnif and KerrDown toolchains

Recorded Future Insikt analysis of OceanLotus geopolitics

Palo Alto Unit 42 reporting on ASEAN intrusions

Citizen Lab reports on Vietnamese surveillance operations

Campaign Timeline

2012-15

Targets: Chinese entities in South China Sea disputes

Method: Phishing + custom backdoors (early OceanLotus malware)

Impact: Espionage on maritime disputes

2015

Targets: Vietnamese bloggers & activists

Method: Malicious Word documents, keyloggers

Impact: Domestic monitoring of dissent

2016

Targets: Journalists, NGOs, human rights groups in Vietnam & abroad

Method: Phishing campaigns w/ KerrDown loader

Impact: Monitoring and suppression of political dissent

2017

Operation Cobalt Kitty

Targets: Asian corporations (supply chain compromise)​

Method: Spear-phishing + RATs + lateral movement

Impact: Months-long infiltration of company networks

2018

Targets: Ministries in Laos & Cambodia; foreign automakers

Method: Watering hole attacks; Cobalt Strike loaders

Impact: Political intel + economic espionage

Ratsniff Malware

Targets: Corporate networks

Method: Custom packet-sniffing backdoor (Ratsnif)

Impact: Network monitoring, data theft

2020
COVID-19 Ops

Targets: Chinese gov orgs & research tied to pandemic

Method: Phishing w/ COVID themes → KerrDown, Denes

Impact: Intelligence collection on outbreak response

2021

Targets: Vietnamese dissidents & NGOs abroad

Method: OceanLotus custom macOS malware (OSX.OceanLotus)

Impact: Surveillance of activists using Apple devices

2022-2024

Targets: Regional NGOs, journalists, Vietnamese diaspora

Method: Spear-phishing; upgraded KerrDown loaders

Impact: Continued monitoring with lower visibility but steady persistence

bottom of page