Cyber-espionage activities of the Ke3chang advanced persistent threat group (APT) group (also known as Vixen Panda, Playful Dragon, and APT15) span over almost a decade. The group’s main targets are entities from the military, government contractors, as well as European diplomatic missions and organizations. ESET researchers have found a new backdoor named Okrum connected with the group operating from China have been found by the researchers. The Okrum malware uses a constantly changing architecture featuring multiple stages and components.
Source: https://www.bleepingcomputer.com/news/security/new-okrum-malware-used-by-ke3chang-group-to-target-diplomats/

