Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Red Apollo

From Wikipedia, the free encyclopedia
Chinese cyberespionage group
This article is about the threat actor. For the butterfly, seeParnassius epaphus. For the element, seePotassium.
Red Apollo
Formationc. 2003–2005[1]
TypeAdvanced persistent threat
PurposeCyberespionage,cyberwarfare
Region
China
MethodsZero-days,Phishing,backdoor (computing),RAT,Keylogging
Official language
Chinese
Parent organization
Tianjin State Security Bureau of theMinistry of State Security
Formerly called
APT10
Stone Panda
MenuPass
RedLeaves
CVNX
POTASSIUM

Red Apollo (also known asAPT 10 byMandiant,MenuPass byFireeye,Stone Panda byCrowdstrike, andPOTASSIUM byMicrosoft)[1][2] is aChinese state-sponsoredcyberespionage group which has operated since 2006. In a 2018 indictment, theUnited States Department of Justice attributed the group to theTianjin State Security Bureau of theMinistry of State Security.[3]

The team was designated anadvanced persistent threat by Fireeye, who reported that they target aerospace, engineering, and telecom firms and any government that they believe is a rival ofChina.

Fireeye stated that they could be targeting intellectual property from educational institutions such as a Japanese university and is likely to expand operations into the education sector in the jurisdictions of nations that are allied with theUnited States.[4] Fireeye claimed that they were tracked since 2009, however because of the low-threat nature they had posed, they were not a priority. Fireeye now describes the group as "a threat to organizations worldwide."[4]

Tactics

[edit]

The group directly targets managed information technology service providers (MSPs) usingRAT. The general role of an MSP is to help manage a company's computer network. MSPs were often compromised by Poison Ivy, FakeMicrosoft, PlugX, ArtIEF,Graftor, and ChChes, through the use ofspear-phishing emails.[5]

History

[edit]

2014 to 2017: Operation Cloud Hopper

[edit]

Operation Cloud Hopper was an extensive attack and theft of information in 2017 directed at MSPs in the United Kingdom (U.K.), United States (U.S.), Japan, Canada, Brazil, France, Switzerland, Norway, Finland, Sweden, South Africa, India, Thailand, South Korea and Australia. The group used MSP's as intermediaries to acquire assets and trade secrets from MSP-client engineering, industrial manufacturing, retail, energy, pharmaceuticals, telecommunications, and government agencies.

Operation Cloud Hopper used over 70 variants of backdoors,malware andtrojans. These were delivered through spear-phishing emails. The attacks scheduled tasks or leveraged services/utilities to persist inMicrosoft Windows systems even if the computer system was rebooted. It installed malware and hacking tools to access systems and steal data.[5]

2016 US Navy personnel data

[edit]

Hackers accessed records relating to 130,000US Navy personnel (out of 330,000).[6] Under these actions the Navy decided to coordinate withHewlett Packard Enterprise Services, despite warnings being given prior to the breach.[7] All affected sailors were required to be notified.

2018 Indictments

[edit]

A 2018 Indictment showed evidence that CVNX was not the name of the group, but was the alias of one of two hackers. Both used four aliases each to make it appear as if more than five hackers had attacked.

Post-Indictment activities

[edit]

In April 2019 APT10 targeted government and private organizations in thePhilippines.[8]

In 2020 Symantec implicated Red Apollo in a series of attacks on targets in Japan.[9]

In March 2021, they targetedBharat Biotech and theSerum Institute of India (SII), the world's largest vaccine maker's intellectual property forexfiltration.[10]

See also

[edit]

References

[edit]
  1. ^"APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat".FireEye.Archived from the original on 2021-04-28. Retrieved2021-03-07.
  2. ^Kozy, Adam (2018-08-30)."Two Birds, One STONE PANDA".Archived from the original on 2021-01-15. Retrieved2021-03-07.
  3. ^"Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information".United States Department of Justice. 2018-12-20.Archived from the original on 2021-05-01. Retrieved2021-03-07.
  4. ^ab"APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat « APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat".FireEye. April 6, 2017.Archived from the original on April 28, 2021. RetrievedJune 30, 2019.
  5. ^ab"Operation Cloud Hopper: What You Need to Know - Security News - Trend Micro USA".trendmicro.com. April 10, 2017.Archived from the original on June 30, 2019. RetrievedJune 30, 2019.
  6. ^"Chinese hackers allegedly stole data of more than 100,000 US Navy personnel".MIT Technology Review.Archived from the original on 2019-06-18. Retrieved2019-06-30.
  7. ^"US Navy Sailor Data 'Accessed by Unknown Individuals'".bankinfosecurity.com.Archived from the original on 2019-06-30. Retrieved2019-07-12.
  8. ^Manantan, Mark (September 2019)."The Cyber Dimension of the South China Sea Clashes". No. 58. The Diplomat. The Diplomat.Archived from the original on 17 February 2016. Retrieved5 September 2019.
  9. ^Lyngaas, Sean (17 November 2020)."Symantec implicates APT10 in sweeping hacking campaign against Japanese firms".www.cyberscoop.com. Cyberscoop.Archived from the original on 18 November 2020. Retrieved19 November 2020.
  10. ^N. Das, Krishna (1 March 2021)."Chinese hacking group Red Apollo (APT10) had identified gaps and vulnerabilities in the IT infrastructure and supply chain software of Bharat Biotech and the Serum Institute of India (SII), the world's largest vaccine maker".Reuters.Archived from the original on 3 May 2021. Retrieved1 March 2021.
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
(MSS Headquarters:Yidongyuan, Xiyuan,Haidian District,Beijing, China)
Organization
Headquarters bureaus
Municipal bureaus
Provincial departments
Departments in
autonomous regions
Schools
Research institutes
Front organizations
Other components
Ministers
Major international
operations
Notable works
Activities by country
Retrieved from "https://en.wikipedia.org/w/index.php?title=Red_Apollo&oldid=1283369511"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp