Apt23

Threat Actor updated 4 months ago (2024-05-04T16:33:02.840Z)
Download STIX
Preview STIX
APT23, also known as PIRATE PANDA, KeyBoy and Tropic Trooper, is a threat actor suspected to be attributed to China. This group has been observed targeting the media and government sectors in the U.S. and the Philippines, with their operations primarily focusing on the theft of politically and militarily significant information rather than intellectual property. The group utilizes malware named NONGMIN and employs spear phishing techniques, often with education-related lures, to compromise victim networks. The group was last observed in February, indicating an ongoing threat. Notably, APT23 actors do not typically use zero-day exploits in their attacks. However, they have demonstrated the ability to leverage these exploits once they become public knowledge. This suggests that the group is adaptive and resourceful, able to incorporate new methods into their operations when beneficial. In summary, APT23 presents a considerable cybersecurity threat, particularly to the media and government sectors in the U.S. and the Philippines. Their primary objective appears to be data theft for traditional espionage purposes, and they employ a range of tactics including spear phishing and the use of public zero-day exploits. Vigilance and robust cybersecurity measures are essential in mitigating the risk posed by this threat actor.
Description last updated: 2023-10-10T23:56:05.179Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Apt23 Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago
Advanced Persistent Threats (APTs) | Threat Actors & Groups
MITRE
2 years ago
Covid-19 Cybersecurity Challenges & Recommendations | CrowdStrike