More about the ShadowPad malware, its targets and capabilities
ShadowPad is an example of the dangers posed by a successful supply-chain attack. Given the opportunities for covert data collection, attackers are likely to pursue this type of attack again and again with other widely used software components. Please find more information here.
Attribution is hard and attackers were very careful to not leave obvious traces, however certain techniques were known to be used in another malware like PlugX and Winnti which were allegedly developed by Chinese-speaking actors.
A supply chain attack in 2017 that delivered a backdoor Trojan hidden in modified versions of software produced by NetSarang, a developer of network connectivity solutions. Once inside a system, the malware can upload files, create processes, and store information.