← All briefs
high April 23, 2026

LIMINAL PANDA: Cloud-Native Espionage Targeting Semiconductors and AI

Source report →

LIMINAL PANDA is a suspected China-nexus cyber-espionage actor active since approximately 2020, assessed with moderate confidence to operate on behalf of a regional bureau of China's Ministry of State Security (MSS). The group targets high-value technology and defense sectors in East Asia, Southeast Asia, and Western nations, focused on semiconductor fabrication data, AI research, military R&D, and dual-use technologies aligned with Beijing's "Made in China 2025" industrial strategy. Targeting and tool overlaps link LIMINAL PANDA to Earth Lusca, Mustang Panda, and RedHotel.

Initial access relies primarily on spearphishing campaigns impersonating technology vendors or research associates, delivering malicious PDF or ZIP files containing PlugX or ShadowPad malware droppers. The group also exploits vulnerable VPN and web-facing servers, and increasingly compromises cloud environments using stolen authentication tokens to bypass traditional perimeter controls.

Persistence in 2024–2025 campaigns shifted toward cloud-native identity techniques. Adversaries create malicious Azure AD applications and service principals that maintain access independent of malware footprints, surviving password resets and MFA enforcement on compromised user accounts. OAuth token theft and conditional access abuse extend this access for months, as observed in 2024 operations against European semiconductor suppliers where Microsoft 365 accounts were leveraged without any endpoint malware.

C2 communications use encrypted HTTPS blended with legitimate cloud services, such as Dropbox, OneDrive, and Alibaba Cloud Object Storage, to hide malicious traffic within normal cloud activity. Prior to exfiltration, data is packaged as encrypted archives and transferred via cloud APIs. The actor regularly clears Windows event logs to destroy forensic evidence and signs malicious binaries with stolen client certificates or self-signed certificates to evade antivirus detection. Legitimate remote access tools including AnyDesk, Ammyy Admin, and TeamViewer are abused for persistent access and file exfiltration.

Infrastructure recycling is a consistent tradecraft hallmark: domains and C2 nodes are rotated every few months, and initial access, collection, and exfiltration use distinct infrastructure segments to frustrate attribution. Notable operations span Taiwan and Japan semiconductor manufacturers (2022), defense research institutes in Singapore and South Korea (2023), Microsoft 365 OAuth token abuse against European chip suppliers (2024), and multi-vector attacks against Western AI research and chip design firms exploiting outdated cloud authentication (2025).

Detections (10)

Enable detections →

Instantly deploy these through Vega.

  • High-Risk Application Permission Granted to Service Principal
  • Malware Email Delivered Through Defenses
  • Credentials Added to Service Principal
  • Security Event Log Cleared
  • OAuth Consent Grant with Risky Permissions
  • User Impersonation Email Delivered
  • Unrecognized Binary Connection to Dropbox API Domain
  • Anomalous Cloud Account Login
  • Unauthorized Remote Access Tool
  • Unexpected Cloud Storage Upload