Intrusions by Liminal Panda, which had some components resembling those leveraged in LightBasin attacks, involved the utilization of the SIGTRANslator Linux ELF binary, network-scanning CordScan utility, and the PingPong backdoor, according to an analysis from CrowdStrike's Counter Adversary Operations team.