Chinese APT Groups

APT41 (Winnti Group)

  • Affiliation: Chinese state-sponsored

  • Activities: Known for dual espionage and cybercrime operations, targeting healthcare, high-tech, telecommunications sectors, and the video game industry. Unique for its financially motivated activities alongside state-sponsored espionage.

  • Targets: Healthcare, high-tech, telecommunications, video game industry.

  • TTPs (Tactics, Techniques, Procedures):

  • Notable Incidents:

    • Global Cyber Espionage: Targeting multiple industries, including the theft of intellectual property from healthcare, high-tech, and telecommunications sectors. APT41 used sophisticated techniques to gain access to sensitive data and research. Read morearrow-up-right

    • Video Game Industry Attacks (2020): Stealing in-game currency and intellectual property from major gaming companies. This involved compromising game servers and developer accounts. Read morearrow-up-right

    • US Healthcare Sector (2019): Targeted the US healthcare sector, stealing patient data and intellectual property related to medical research. APT41 used spear-phishing and malware to infiltrate healthcare organizations. Read morearrow-up-right

    • Global Universities (2020): Conducted cyber espionage against universities worldwide, stealing research data related to biotechnology and other advanced fields. APT41 used sophisticated malware to maintain persistent access. Read morearrow-up-right

    • US Gaming Industry (2021): Targeted the US gaming industry, stealing game source code and other valuable data. This operation involved the use of advanced malware and exploitation of vulnerabilities in gaming platforms. Read morearrow-up-right

APT40 (Leviathan)

APT43

  • Affiliation: Chinese state-sponsored

  • Activities: Known for cyber espionage and targeting NGOs, private companies, and government organizations. Often involved in operations aligned with China's geopolitical interests.

  • Targets: NGOs, private companies, government organizations.

  • Notable Incidents:

    • South Korean Government Hack (2018): APT43 targeted the South Korean government, stealing sensitive political and military information. This operation involved sophisticated spear-phishing campaigns and the use of remote access tools to exfiltrate data. Read morearrow-up-right

    • South Korean Media Hack (2019): Infiltrated South Korean media organizations, aiming to influence public opinion by spreading propaganda and misinformation. APT43 used spear-phishing and custom malware to gain access to media networks. Read morearrow-up-right

    • South Korean Defense Contractors Hack (2020): Targeted South Korean defense contractors to steal information related to military technologies. APT43 used advanced malware and network reconnaissance techniques to achieve their objectives. Read morearrow-up-right

    • Operations in South China Sea (2020): APT43 targeted entities in the South China Sea region to support China's geopolitical interests, focusing on maritime research and defense-related information. Read morearrow-up-right

Last updated