APT40

Advanced persistent threat located in China
Leviathan
Formationc. 2009[1]
TypeAdvanced persistent threat
PurposeCyberespionage,
HeadquartersHainan Province
Region
China
MethodsMalware, Zero-days, Phishing, backdoor (computing), RAT, Keylogging
Official language
Chinese
Parent organization
Hainan State Security Department of the Ministry of State Security
Formerly called
APT40
Kryptonite Panda
Hellsing
Leviathan
TEMP.Periscope
Temp.Jumper
Gadolinium
GreenCrash
Bronze Mohawk

APT40, also known as BRONZE MOHAWK (by Secureworks),[1] FEVERDREAM, G0065, GADOLINIUM (formerly by Microsoft),[2] Gingham Typhoon[3] (by Microsoft), GreenCrash, Hellsing (by Kaspersky),[4] Kryptonite Panda (by Crowdstrike), Leviathan (by Proofpoint),[5] MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper, is an advanced persistent threat operated by the Hainan State Security Department, a branch of the Chinese Ministry of State Security located in Haikou, Hainan, China, and has been active since at least 2009.

APT40 has targeted governmental organizations, companies, and universities in a wide range of industries, including biomedical, robotics, and maritime research, across the United States, Canada, Europe, the Middle East, and the South China Sea area, as well as industries included in China's Belt and Road Initiative.[6] APT40 is closely connected to Hafnium.[7]

History

On July 19, 2021, the U.S. Department of Justice (DOJ) unsealed an indictment against four APT40 cyber actors for their illicit computer network exploitation activities via front company Hainan Xiandun Technology Development Company.[6]

In March 2024, the New Zealand Government and its signals intelligence agency Government Communications Security Bureau accused the Chinese government via APT40 of breaching its parliamentary network in 2021.[8]

See also

References

  1. ^ "BRONZE MOHAWK | Secureworks". Archived from the original on 2022-07-02. Retrieved 2022-07-27.
  2. ^ "Microsoft Security—detecting empires in the cloud". Microsoft. 24 September 2020. Archived from the original on 27 July 2022. Retrieved 27 July 2022.
  3. ^ "How Microsoft names threat actors". Microsoft. Retrieved 21 January 2024.
  4. ^ "Hellsing Targeted Attacks". 13 January 2021. Archived from the original on 27 July 2022. Retrieved 27 July 2022.
  5. ^ "Leviathan: Espionage actor spearphishes maritime and defense targets | Proofpoint US". 16 October 2017. Archived from the original on 28 May 2022. Retrieved 27 July 2022.
  6. ^ a b National Cyber Awareness System (19 July 2021). "Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China's MSS Hainan State Security Department". Cybersecurity and Infrastructure Security Agency. Archived from the original on 19 July 2021. Retrieved 19 July 2021.
  7. ^ Mackie, Kurt (July 19, 2021). "White House Says China's APT40 Responsible for Exchange Hacks, Ransomware Attacks -- Redmondmag.com". Redmondmag. Archived from the original on May 17, 2022. Retrieved April 24, 2022.
  8. ^ Pearse, Adam (26 March 2024). "Parliament systems targeted by China-based hackers". The New Zealand Herald. Archived from the original on 26 March 2024. Retrieved 28 March 2024.
  • v
  • t
  • e
(MSS Headquarters: Yidongyuan Compound, Xiyuan, Haidian District, Beijing, China)
Organization
Headquarters bureaus
  • Confidential Communication
  • International Intelligence
  • Political & Economic Intelligence
  • Taiwan, Hong Kong and Macao
  • Analysis and Dissemination
  • Operational Guidance
  • Counterespionage
  • Counterespionage Investigation
  • Internal Security
  • External Security
  • CICIR
  • Social Investigation Bureau
  • CNITSEC
  • Technical Reconnaissance
  • Institute of Taiwan Studies
  • Imaging Intelligence
  • Enterprises
  • United States
  • Counterterrorism
Municipal bureaus
Provincial departments
  • Anhui
  • Fujian
  • Gansu
  • Guangdong
    • APT3
  • Guizhou
  • Hainan
    • APT40
  • Hebei
  • Heilongjiang
  • Henan
  • Hubei
  • Hunan
  • Jiangsu
    • APT26
  • Jiangxi
  • Jilin
  • Liaoning
  • Qinghai
  • Shaanxi
  • Shandong
  • Shanxi
  • Sichuan
  • Yunnan
  • Zhejiang
Departments in
autonomous regions
  • Guangxi
  • Inner Mongolia
  • Ningxia
  • Tibet
  • Xinjiang
    • XPCC
Schools
Research institutes
  • Nanjing Institute of Information Technology
Front organizations
MinistersMajor international
operationsNotable works
Activities by country
  • v
  • t
  • e
Hacking in the 2010s
← 2000s Timeline 2020s →
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Advanced
persistent threats
Individuals
Major vulnerabilities
publicly disclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
  • v
  • t
  • e
Hacking in the 2020s
← 2010s Timeline 2030s →
Major incidents
2020
2021
2022
2023
2024
Groups
Individuals
Major vulnerabilities
publicly disclosed
Malware
2020
2021
  • Predator
2022