🇨🇳Chines APT
Chinese Advanced Persistent Threat (APT) groups are known for their advanced cyber-espionage techniques and strategic targeting of various sectors, including government, military, and corporate entities. Here is a list of some prominent Chinese APT groups:
Notable Chinese APT Groups
APT1 (Comment Crew, Shanghai Group)
Affiliation: Likely associated with the People's Liberation Army (PLA) Unit 61398
Targets: U.S. and international corporations, particularly in technology, defense, and critical infrastructure.
Notable Activities: Extensive data theft, intellectual property theft, and espionage.
APT10 (Stone Panda, MenuPass)
Affiliation: Likely associated with the Chinese Ministry of State Security (MSS)
Targets: Global technology, aerospace, and engineering sectors.
Notable Activities: Intellectual property theft, espionage, and supply chain attacks.
APT12 (Twilight Spider)
Affiliation: Chinese government interests
Targets: High-profile organizations and government entities.
Notable Activities: Data theft and espionage focused on military and political targets.
APT13 (Tempura)
Affiliation: Likely associated with the Chinese Ministry of State Security (MSS)
Targets: Technology, defense, and pharmaceutical sectors.
Notable Activities: Cyber-espionage, particularly focused on military technology and intellectual property.
APT14 (C0d0so0, Greenbug)
Affiliation: Likely Chinese interests
Targets: Technology and telecommunications sectors.
Notable Activities: Cyber-espionage and data exfiltration.
APT15 (Ke3chang, Vixen Panda)
Affiliation: Likely associated with the Chinese Ministry of State Security (MSS)
Targets: Government, military, and critical infrastructure sectors.
Notable Activities: Espionage and information gathering, particularly targeting sensitive information.
APT16 (Drapes, Grey Energy)
Affiliation: Likely Chinese interests
Targets: Government agencies, defense, and aerospace sectors.
Notable Activities: Espionage and data theft related to government and defense technology.
APT17 (Hidden Lynx)
Affiliation: Likely associated with Chinese interests
Targets: Technology, telecommunications, and defense sectors.
Notable Activities: Cyber-espionage and data theft focused on technology and critical infrastructure.
APT19 (Deep Panda, KungFu Kittens)
Affiliation: Likely Chinese government interests
Targets: Technology, defense, and energy sectors.
Notable Activities: Cyber-espionage, particularly targeting intellectual property and critical infrastructure.
APT32 (OceanLotus, SeaLotus)
Affiliation: Likely associated with Vietnamese interests but has links to Chinese operations.
Targets: Government agencies, businesses, and political entities, primarily in Southeast Asia.
Notable Activities: Espionage, data theft, and cyber-espionage focused on regional targets.
APT33 (Elfin, Magnallium)
Affiliation: Iranian but has been known to operate with coordination from Chinese interests.
Targets: Aerospace, energy, and petrochemical sectors.
Notable Activities: Industrial espionage and attacks on critical infrastructure.
APT34 (OilRig, Helix)
Affiliation: Iranian with some operations linked to Chinese interests.
Targets: Financial, energy, and telecommunications sectors.
Notable Activities: Espionage and data theft related to critical infrastructure.
Last updated