Researchers Tracks Three Groups Emerging From LABYRINTH CHOLLIMA

Published
Written by:
Vishwa Pandagle
Vishwa Pandagle
Cybersecurity Staff Editor
Key Takeaways
  • Three groups: Activity linked to LABYRINTH CHOLLIMA now maps to three distinct adversaries.
  • Focus: Two groups prioritize cryptocurrency revenue, while core operations remain focused on espionage.
  • Shared infrastructure: The groups continue sharing tools, malware frameworks, and operational tradecraft.

A new threat research has found that threat actors tracked as LABYRINTH CHOLLIMA involve three groups coordinating with varying focuses on revenue generation and cyber espionage.

Researchers tracked GOLDEN CHOLLIMA, PRESSURE CHOLLIMA, and LABYRINTH CHOLLIMA with distinct malware, objectives, and tradecraft, while sharing infrastructure and tools.

GOLDEN CHOLLIMA, PRESSURE CHOLLIMA, and LABYRINTH CHOLLIMA Objectives

Researchers assess that LABYRINTH CHOLLIMA activity traces back to the KorDLL malware which was active between 2009 and 2015. They later led to the development of malware families like Dozer, Brambul, Joanap, KorDLL Bot, and Koredos, before evolving into the Hawup and TwoPence frameworks.

The Hawup framework is an espionage-focused malware toolset linked to LABYRINTH CHOLLIMA. 

Operation and Structure

The three subgroups emerged from the Hawup framework between 2018 and 2020. The following structure shows the groups’ operations with origins and missions.

LABYRINTH CHOLLIMA

GOLDEN CHOLLIMA

PRESSURE CHOLLIMA

All three groups reuse infrastructure, including malware such as FudModule, which employs kernel-level manipulation.

Mitigation Guidelines

Researchers outlined the following steps based on their tradecraft:

LABYRINTH CHOLLIMA

GOLDEN CHOLLIMA

PRESSURE CHOLLIMA

For organizations, it is important to pay closer attention to how software is introduced into the environment,particularly through third-party packages. Greater visibility into cloud and identity activity after an intrusion is also critical. 


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: