APT27

Threat Actor updated 25 days ago (2024-08-14T09:19:43.903Z)
Download STIX
Preview STIX
APT27, also known as Iron Taurus, is a threat actor group suspected to be attributed to China. Engaging in cyber operations with the primary goal of intellectual property theft, APT27 targets organizations globally, with a focus on North and South America, Europe, and the Middle East. The group's modus operandi often involves spear-phishing as its initial compromise method. APT27 has been associated with several malware types including PANDORA, SOGU, ZXSHELL, GHOST, WIDEBERTH, QUICKPULSE, and FLOWERPOT. It is part of an extensive Chinese Advanced Persistent Threat (APT) operational infrastructure, which includes other groups like Winnti (Starchy Taurus) and Mustang Panda (Stately Taurus). APT27 has been involved in numerous campaigns, including Operation Diplomatic Specter, where it leveraged shared Chinese APT operational infrastructure. This operation was linked to other China-aligned actors like Space Pirates in Operation Iron Tiger and Operation Exorcist, targeting the Catholic Church. APT27 has also collaborated with other APT groups such as APT31, sharing tools and strategies. The group has exploited vulnerabilities like Log4j and "ProxyLogon" in Microsoft Exchange, as well as bugs in software from provider Zoho. APT27 exhibits a high degree of operational sophistication and frequently alters its attack strategies for obfuscation, evasion, and maintaining long-term network persistence. It deploys fileless malware and pivots within target networks. The group primarily conducts watering hole and spear-phishing attacks to gain initial footholds within target networks. Since 2020, APT27 operators have also engaged in ransomware-based cybercriminal activities. In early 2022, warnings about APT27's operations were issued by German intelligence services and Belgian authorities following espionage campaigns targeting Belgium’s Interior and Defence Ministries.
Description last updated: 2024-08-14T09:01:03.884Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Emissary Panda
7
Emissary Panda, also known as APT27, Iron Tiger, Bronze Union, Lucky Mouse, and Budworm, is a notable threat actor linked to China. This group has been engaged in the theft of intellectual property from organizations in sectors that China perceives as being of vital strategic interest. The group has
Iron Tiger
4
Iron Tiger, also known as Iron Taurus or APT27, is a threat actor group known for executing malicious actions with the intent of espionage. The group became prominent after its involvement in Operation Iron Tiger, which was reported in 2015. This operation was a series of Chinese cyber-espionage att
LuckyMouse
4
LuckyMouse, also known as Budworm, Emissary Panda, and APT27, is a threat actor that has been involved in several high-profile cyber-espionage activities. The group has demonstrated its ability to develop and deploy advanced cyber tools, targeting various operating systems including MacOS, Linux, an
Lucky Mouse
3
Lucky Mouse, also known as Emissary Panda, APT27, Threat Group 3390, Bronze Union, and several other names, is a malicious software (malware) attributed to a China-linked Advanced Persistent Threat (APT) group. This malware has been active since at least 2013, targeting various industry verticals fo
SysUpdate
3
SysUpdate is a malicious software variant that has been exclusively used by Budworm, also known as APT27, Emissary Panda, Bronze Union, Lucky Mouse, Iron Tiger, and Red Phoenix. In December 2020, a sample of the SysUpdate malware variant was found, with its payload being a new version of SysUpdate.
BRONZE UNION
2
Bronze Union, also known as APT27, Emissary Panda, Lucky Mouse, Iron Tiger, and Red Phoenix, is a threat actor with alleged connections to the Chinese government. The group has been observed targeting organizations across Europe, North and South America, Africa, the Middle East, and the Asia-Pacific
Budworm
2
Budworm, also known as LuckyMouse or APT 27, is a threat actor that has been associated with various high-profile cyber attacks. This group has been found to utilize tools such as the Korplug backdoor, which is commonly used by multiple Advanced Persistent Threats (APTs) including Budworm and APT41,
Iron Taurus
2
Iron Taurus, also known as APT27, is a malware that has been linked to various cyber-espionage activities. This malicious software is designed to infiltrate systems surreptitiously through suspicious downloads, emails, or websites, and once inside, it can steal personal information, disrupt operatio
Cobra Docguard
2
Cobra DocGuard, a software produced by Chinese firm EsafeNet for protecting, encrypting, and decrypting software, has been exploited in a series of malware attacks. The attackers compromised the software's update files to deliver malicious updates that infected targeted systems. The first known inst
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Apt
Backdoor
Espionage
Implant
Phishing
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
CobraUnspecified
2
Cobra is a type of malware, short for malicious software, designed to exploit and damage computer systems or devices. It can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, Cobra has the potential to steal personal information, disrup
Stately TaurusUnspecified
2
Stately Taurus is a sophisticated malware associated with a Chinese Advanced Persistent Threat (APT) group that conducts cyberespionage campaigns. This group has been observed targeting government entities, as well as religious and non-governmental organizations across Europe and Asia. The malware i
PlugYUnspecified
2
PlugY is a newly identified malware that has been deployed by cyber attackers to infiltrate systems and cause significant damage. This malicious software, known for its capacity to exploit and harm computer systems, can enter a system through suspicious downloads, emails, or websites, often unbeknow
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
APT31Unspecified
4
APT31, also known as Zirconium, is a threat actor group linked to the Chinese government that has been implicated in numerous cyber espionage activities. One of their most notable exploits was the cloning of the Equation Group's exploit, EpMe (CVE-2017-0005). This exploit was initially discovered du
Mustang PandaUnspecified
4
Mustang Panda, also known as Bronze President, Nomad Panda, Naikon, Earth Preta, and Stately Taurus, is a Chinese-aligned threat actor that has been associated with widespread attacks against various countries in the Asia-Pacific region. The group's malicious activities were first traced back to Mar
Ke3changUnspecified
2
Ke3chang, also known as APT15, Mirage, Vixen Panda GREF, and Playful Dragon, is a prominent threat actor that has been active since at least 2010. According to the European Union Agency for Cybersecurity (ENISA), this group has consistently targeted energy, government, and military sectors. Ke3chang
APT30Unspecified
2
APT30, a threat actor suspected to be attributed to China, has been active since at least 2005. This group primarily targets members of the Association of Southeast Asian Nations (ASEAN). APT30 is notable for its sustained activity over an extended period and its ability to adapt and modify source c
GALLIUMUnspecified
2
Gallium, also known as Alloy Taurus, is a China-aligned threat actor known for executing actions with malicious intent in the cyber domain. In recent years, Gallium has been associated with various significant cyber-espionage campaigns. The group targeted telecommunication entities in the Middle Eas
Source Document References
Information about the APT27 Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
24 days ago
'EastWind' Cyber Spy Campaign Combines Various Chinese APT Tools
Securelist
24 days ago
EastWind campaign distributes CloudSorcerer and two APT tools
Securityaffairs
a month ago
EastWind campaign targets Russian organizations with sophisticated backdoors
Securityaffairs
3 months ago
Velvet Ant uses F5 BIG-IP malware in cyber espionage campaign
BankInfoSecurity
3 months ago
Active Chinese Cyberespionage Campaign Rifling Email Servers
Unit42
3 months ago
Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia
CERT-EU
a year ago
Multiple Chinese APTs are attacking European targets, EU cyber agency warns | #ukscams | #datingscams | #european | #datingscams | #love | #relationships | #scams | #pof | #match.com | #dating | National Cyber Security Consulting
CERT-EU
a year ago
China-based spies are hacking East Asian semiconductor companies, report says | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
a year ago
Semiconductor firms targeted by Chinese hackers
CERT-EU
a year ago
China-linked cyberspies backdoor semiconductor firms with Cobalt Strike
CERT-EU
a year ago
Budworm: APT Group Uses Updated Custom Tool in Attacks on Government and Telecoms Org - Cyber Security Review
CERT-EU
a year ago
DDoS attack hits Russian flight booking system claimed by Ukrainian hackers
CERT-EU
a year ago
Asian government, telco targeted by Chinese APT
CERT-EU
a year ago
Cyber Security Week in Review: September 29, 2023
InfoSecurity-magazine
a year ago
Budworm APT Evolves Toolset, Targets Telecoms and Government
CERT-EU
a year ago
Budworm hackers target telcos and govt orgs with custom malware
CERT-EU
a year ago
My Tea's not cold : an overview of China's cyber threat – Global Security Mag Online
BankInfoSecurity
a year ago
Threat Actor Targets Hong Kong With Korplug Backdoor
CERT-EU
a year ago
Novel Carderbee supply chain attack impacts Asian organizations
Securityaffairs
a year ago
Carderbee APT targets Hong Kong orgs via supply chain attacks