Page cover

🇨🇳Chines APT

Chinese Advanced Persistent Threat (APT) groups are known for their advanced cyber-espionage techniques and strategic targeting of various sectors, including government, military, and corporate entities. Here is a list of some prominent Chinese APT groups:

Notable Chinese APT Groups

  1. APT1 (Comment Crew, Shanghai Group)

    • Affiliation: Likely associated with the People's Liberation Army (PLA) Unit 61398

    • Targets: U.S. and international corporations, particularly in technology, defense, and critical infrastructure.

    • Notable Activities: Extensive data theft, intellectual property theft, and espionage.

  2. APT10 (Stone Panda, MenuPass)

    • Affiliation: Likely associated with the Chinese Ministry of State Security (MSS)

    • Targets: Global technology, aerospace, and engineering sectors.

    • Notable Activities: Intellectual property theft, espionage, and supply chain attacks.

  3. APT12 (Twilight Spider)

    • Affiliation: Chinese government interests

    • Targets: High-profile organizations and government entities.

    • Notable Activities: Data theft and espionage focused on military and political targets.

  4. APT13 (Tempura)

    • Affiliation: Likely associated with the Chinese Ministry of State Security (MSS)

    • Targets: Technology, defense, and pharmaceutical sectors.

    • Notable Activities: Cyber-espionage, particularly focused on military technology and intellectual property.

  5. APT14 (C0d0so0, Greenbug)

    • Affiliation: Likely Chinese interests

    • Targets: Technology and telecommunications sectors.

    • Notable Activities: Cyber-espionage and data exfiltration.

  6. APT15 (Ke3chang, Vixen Panda)

    • Affiliation: Likely associated with the Chinese Ministry of State Security (MSS)

    • Targets: Government, military, and critical infrastructure sectors.

    • Notable Activities: Espionage and information gathering, particularly targeting sensitive information.

  7. APT16 (Drapes, Grey Energy)

    • Affiliation: Likely Chinese interests

    • Targets: Government agencies, defense, and aerospace sectors.

    • Notable Activities: Espionage and data theft related to government and defense technology.

  8. APT17 (Hidden Lynx)

    • Affiliation: Likely associated with Chinese interests

    • Targets: Technology, telecommunications, and defense sectors.

    • Notable Activities: Cyber-espionage and data theft focused on technology and critical infrastructure.

  9. APT19 (Deep Panda, KungFu Kittens)

    • Affiliation: Likely Chinese government interests

    • Targets: Technology, defense, and energy sectors.

    • Notable Activities: Cyber-espionage, particularly targeting intellectual property and critical infrastructure.

  10. APT32 (OceanLotus, SeaLotus)

    • Affiliation: Likely associated with Vietnamese interests but has links to Chinese operations.

    • Targets: Government agencies, businesses, and political entities, primarily in Southeast Asia.

    • Notable Activities: Espionage, data theft, and cyber-espionage focused on regional targets.

  11. APT33 (Elfin, Magnallium)

    • Affiliation: Iranian but has been known to operate with coordination from Chinese interests.

    • Targets: Aerospace, energy, and petrochemical sectors.

    • Notable Activities: Industrial espionage and attacks on critical infrastructure.

  12. APT34 (OilRig, Helix)

    • Affiliation: Iranian with some operations linked to Chinese interests.

    • Targets: Financial, energy, and telecommunications sectors.

    • Notable Activities: Espionage and data theft related to critical infrastructure.

Last updated