Organization:APT40
Formation | c. 2009[1] |
---|---|
Type | Advanced persistent threat |
Purpose | Cyberespionage, |
Headquarters | Hainan Province |
Region | China |
Methods | Malware, Zero-days, Phishing, backdoor (computing), RAT, Keylogging |
Official language | Chinese |
Parent organization | Ministry of State Security |
Formerly called | APT40 Kryptonite Panda Hellsing Leviathan TEMP.Periscope Temp.Jumper Gadolinium GreenCrash Bronze Mohawk |
APT40 (also known as BRONZE MOHAWK (by Secureworks),[1] FEVERDREAM, G0065, Gadolinium (by Microsoft),[2] GreenCrash, Hellsing (by Kaspersky),[3] Kryptonite Panda (by Crowdstrike), Leviathan (by Proofpoint),[4] MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper) is an advanced persistent threat located in Haikou, Hainan Province, People's Republic of China (PRC), and has been active since at least 2009. APT40 has targeted governmental organizations, companies, and universities in a wide range of industries, including biomedical, robotics, and maritime research, across the United States , Canada , Europe, the Middle East, and the South China Sea area, as well as industries included in China's Belt and Road Initiative.[5]
APT40 is closely connected to Hafnium.[6]
Indictment
On July 19, 2021, the U.S. Department of Justice (DOJ) unsealed an indictment against four APT40 cyber actors for their illicit computer network exploitation activities via front company Hainan Xiandun Technology Development Company.[5]
See also
References
- ↑ "BRONZE MOHAWK | Secureworks". https://www.secureworks.com/research/threat-profiles/bronze-mohawk.
- ↑ "Microsoft Security—detecting empires in the cloud". 24 September 2020. https://www.microsoft.com/security/blog/2020/09/24/gadolinium-detecting-empires-cloud/.
- ↑ "Hellsing Targeted Attacks". 13 January 2021. https://usa.kaspersky.com/resource-center/threats/hellsing-apt.
- ↑ "Leviathan: Espionage actor spearphishes maritime and defense targets | Proofpoint US". 16 October 2017. https://www.proofpoint.com/us/threat-insight/post/leviathan-espionage-actor-spearphishes-maritime-and-defense-targets.
- ↑ 5.0 5.1 National Cyber Awareness System (19 July 2021). "Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China's MSS Hainan State Security Department". Cybersecurity and Infrastructure Security Agency. https://us-cert.cisa.gov/ncas/alerts/aa21-200a.
- ↑ Mackie, Kurt (July 19, 2021). "White House Says China's APT40 Responsible for Exchange Hacks, Ransomware Attacks -- Redmondmag.com". Redmondmag. https://redmondmag.com/articles/2021/07/19/china-apt40-exchange-attacks.aspx.