menuPass

Threat Actor updated a month ago (2024-10-17T12:02:54.909Z)
Download STIX
Preview STIX
MenuPass, also known as APT10, Stone Panda, and ChessMaster, is a threat actor suspected to be sponsored by the Chinese government. This group has been active since at least 2006, primarily targeting sectors such as construction and engineering, aerospace, telecom firms, and governments in the United States, Europe, and Japan. The cybersecurity firm Mandiant has tracked the group's activities since 2009, with additional tracking conducted by Trend Research. MenuPass employs sophisticated tactics including living-off-the-land techniques, custom fileless malware, anti-analysis tactics, and exploitation of trusted third-party relationships for credential access. The group's signature behaviors were used by MITRE Engenuity to emulate a multi-subsidiary compromise focusing on defense evasion, exploiting trusted relationships, data encryption, and inhibiting system recovery. Furthermore, MenuPass was linked to the development of Trochilus, an advanced persistent threat tool, by researchers from NHS Digital in the UK. CrowdStrike Counter Adversary Operations also identified that the MITRE ATT&CK Evaluations for Managed Services emulated the behavior of MenuPass, alongside another adversary, ALPHA SPIDER (also known as ALPHV BlackCat). Defending against threat actors like MenuPass and ALPHV/BlackCat requires a combination of advanced cybersecurity tools and leading threat intelligence. These groups use well-known tactics, techniques, and procedures (TTPs), making them somewhat predictable for those familiar with their methods. Notably, Trend Micro had an advantage during an evaluation due to its long-term study of both MenuPass and ALPHV/BlackCat, which allowed them to amass deep insights to inform its managed detection and response defenses. As state-sponsored cyber espionage groups, both MenuPass and ALPHV/BlackCat are continually adapting their targets based on their sponsors' interests.
Description last updated: 2024-10-17T11:39:56.137Z
What's your take? (Question 1 of 4)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
APT10 is a possible alias for menuPass. APT10, also known as menuPass, is a sophisticated threat actor believed to be operating on behalf of the Chinese Ministry of State Security (MSS). It has been active since at least 2006 and has been linked to numerous cyber espionage campaigns. The group utilizes advanced techniques and tools that a
3
Stone Panda is a possible alias for menuPass. Stone Panda, also known as APT10 and MenuPass, is a threat actor that has been linked to the Chinese government by researchers from NHS Digital in the UK. The group has developed Trochilus, an advanced persistent threat tool, and is believed to be behind recent espionage efforts against US companies
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Apt
Malware
Mitre
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.