top of page

Apt 17

Mitre

Alias

Helium, Apt17, Tailgater Team, Dogfish, Axiom, Hidden Lynx, Bronze Keystone, Group 8, Aurora Panda, Group 72, Operation �smn�, Apt17,, G0025, G0001

Country

China

Sponsor

China. State-sponsored

Motivation

Nil

First Seen

2009

Description

FireEye described APT17 in a 2015 report as: 'APT17, also known as DeputyDog, is a China based threat group that FireEye Intelligence has observed conducting network intrusions against U.S. government entities, the defense industry, law firms, information technology companies, mining companies, and non-government organizations.' (Talos) Group 72 is a long standing threat actor group involved in Operation SMN, named Axiom by Novetta. The group is sophisticated, well funded, and possesses an established, defined software development methodology. The group targets high profile organizations with high value intellectual property in the manufacturing, industrial, aerospace, defense, media sectors. Geographically, the group almost exclusively targets organizations based in United States, Japan, Taiwan, and Korea. The preferred tactics of the group include watering-hole attacks, spear-phishing, and other web-based tactics. The tools and infrastructure used by the attackers are common to a number of other threat actor groups which may indicate some degree of overlap. We have seen similar patterns used in domain registration for malicious domains, and the same tactics used in other threat actor groups leading us to believe that this group may be part of a larger organization that comprises many separate teams, or that different groups share tactics, code and personnel from time to time. Though both this group and 'Winnti Group, Blackfly, Wicked Panda' use the malware Winnti, the two groups appear to be distinct based on differences in reporting on the groups� TTPs and targeting. Could be related to 'APT 17, Deputy Dog, Elderwood, Sneaky Panda' and/or 'APT 20, Violin Panda'. (Symantec) The Hidden Lynx group has been in operation since at least 2009 and is most likely a professional organization that offers a �hackers for hire� service. They have the capability to attack many organizations with concurrently running campaigns. They operate efficiently and move quickly and methodically. Based on these factors, the Hidden Lynx group would need to be a sizeable organization made up of between 50 and 100 individuals. Much of the attack infrastructure and tools used during these campaigns originate from network infrastructure in China. The Hidden Lynx group makes regular use of zero-day exploits and has the ability to rework and customize exploits quickly. They are methodical in their approach and they display a skillset far in advance of some other attack groups also operating in that region, such as the Comment Crew (also known as APT1). The Hidden Lynx group is an advanced persistent threat that has been in operation for at least four years and is breaking into some of the best-protected organizations in the world. With a zero-day attack already under their belt in 2013, they continue to operate at the leading edge of targeted attacks. This group appears to be closely associated with 'APT 17, Deputy Dog, Elderwood, Sneaky Panda'.

Targeted
Industries

Construction, Retail, Financial, Media, Government, Retail,, It, Education, Engineering, Industrial, Private Sector, Food And Agriculture, Non-profit Organizations, Defense, Manufacturing, Civil Society, Aerospace, Pharmaceutical, Healthcare

Targeted
Countries

Canada, Hong Kong, Italy, France, United Kingdom, Switzerland, Ukraine, China, Russia, Germany, Taiwan, Netherlands, Usa, Uk, United States, Japan, India, Belgium, Australia, Singapore, South Korea, Indonesia, United States,

Tools

Winnti
Derusbi
Deputydog
Moudoor
Zxshell
Zoxrpc
Gh0st
Naid
Poison
Hikit
Plugx
9002
Blackcoffee

TTP

T1003
T158302
T1583.003
T1583
T1584.005
T1203
T1584
T1001
T158405
T154608
T1021
T1560
T102101
T156302
T1546
T100102
T1190
T1189
T1546.008
T1583.002
T1563
T1078
T1563.002
T1005
T1001.002
T1553
T158303
T1566
T1021.001

Operations
Performed

Nil

Counter
Operations

Nil

Information

nil

bottom of page