top of page
Mitre
Alias
Operation �clandestine Wolf�, Part Deux, Group 6, Apt 3, Red Sylvan, Ups, Boron, Apt3, Operation �double Tap�, Ups Team, Tg-0110, Operation �clandestine Fox�, Boyusec, Buckeye, Gothic Panda, Bronze Mayfair
Country
China
Sponsor
Ministry Of State Security And Internet Security Firm Guangzhou Bo Yu Information Technology Company Limited (�boyusec�), China. State-sponsored, State-sponsored
Motivation
Information Theft And Espionage
First Seen
2007
Description
(Recorded Future) APT3 (also known as UPS, Gothic Panda, and TG-0110) is a sophisticated threat group that has been active since at least 2010. APT3 utilizes a broad range of tools and techniques including spear-phishing attacks, zero-day exploits, and numerous unique and publicly available remote access tools (RAT). Victims of APT3 intrusions include companies in the defense, telecommunications, transportation, and advanced technology sectors � as well as government departments and bureaus in Hong Kong, the U.S., and several other countries.
Targeted
Industries
Aerospace, Defense, Construction, High-tech, Private Sector, Manufacturing, Telecommunications, Technology, Transportation
Targeted
Countries
Usa, Uk, Hong Kong, Sweden, United States, Italy, Vietnam, Luxembourg, United Kingdom, Philippines, Belgium
Tools
Htran
Lazagne
W32times
Apt3 Keylogger
Doublepulsar
Plugx
Remotecmd
Hupigon
Shareip
Eternalblue
Osinfo
Firefox And Flash
Apt3
Several 0-days For Ie
Pirpi
Ttcalc
Bemstour
TTP
Nil
Operations
Performed
[2007] hupigon And Pirpi Backdoors (https://www.fireeye.com/blog/threat-research/2010/11/ie-0-day-hupigon-joins-the-party.html)
[2014-04] operation �clandestine Fox� (fireeye Research Labs Identified A New Internet Explorer (ie) Zero-day Exploit Used In Targeted Attacks. The Vulnerability Affects Ie6 Through Ie11, But The Attack Is Targeting Ie9 Through Ie11. This Zero-day Bypasses Both Aslr And Dep. Microsoft Has Assigned Cve-2014-1776 To The Vulnerability And Released Security Advisory To Track This Issue. (https://www.fireeye.com/blog/threat-research/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html)
[2014-06] operation �clandestine Fox�, Part Deux (while Microsoft Quickly Released A Patch To Help Close The Door On Future Compromises, We Have Now Observed The Threat Actors Behind �operation Clandestine Fox� Shifting Their Point Of Attack And Using A New Vector To Target Their Victims: Social Networking. (https://www.fireeye.com/blog/threat-research/2014/06/clandestine-fox-part-deux.html)
[2014-11] operation �double Tap� (this Actor Initiated Their Most Recent Campaign On November 19, 2014 Targeting Multiple Organizations. The Attacker Leveraged Multiple Exploits, Targeting Both Cve-2014-6332 And Cve-2014-4113. (https://www.fireeye.com/blog/threat-research/2014/11/operation_doubletap.html)
[2015-06] operation �clandestine Wolf� (in The Last Several Weeks, Apt3 Actors Launched A Large-scale Phishing Campaign Against Organizations In The Following Industries: Aerospace And Defense, Construction And Engineering, High Tech, Telecommunications And Transportation. (https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe-flash-zero-day.html)
[2016-03] variant Of The Doublepulsar Backdoor (beginning In March 2016, Buckeye Began Using A Variant Of Doublepulsar (backdoor.doublepulsar), A Backdoor That Was Subsequently Released By The Shadow Brokers In 2017. Doublepulsar Was Delivered To Victims Using A Custom Exploit Tool (trojan.bemstour) That Was Specifically Designed To Install Doublepulsar. (https://www.symantec.com/blogs/threat-intelligence/buckeye-windows-zero-day-exploit (https://research.checkpoint.com/upsynergy/)
[2016-03] buckeye Cyberespionage Group Shifts Gaze From Us To Hong Kong (https://www.symantec.com/connect/blogs/buckeye-cyberespionage-group-shifts-gaze-us-hong-kong
Counter
Operations
'date': '2017-11', 'activity': 'doj Reveals Indictment Against Chinese Cyber Spies That Stole U.s. Business Secrets (https://www.cyberscoop.com/boyusec-china-doj-indictment/', 'date': '2017-11', 'activity': 'u.s. Charges Three Chinese Hackers Who Work At Internet Security Firm For Hacking Three Corporations For Commercial Advantage (https://www.justice.gov/opa/pr/us-charges-three-chinese-hackers-who-work-internet-security-firm-hacking-three-corporations'
Information
bottom of page