DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home APT

APT12 (Numbered Panda, Crimson Iron) – China

Reading Time: 3 mins read
in APT
Names APT12 (Mandiant, FireEye), Numbered Panda (CrowdStrike), Crimson Iron (Threat Connect)
Additional Names TG-2754, BeeBus, Group 22, DynCalc, Calc Team, DNSCalc, BRONZE GLOBE, IXESHE
Location China
Date of initial activity 2009
Suspected attribution People’s Liberation Army
Motivation Information theft and espionage
Associated tools AUMLIB, ETUMBOT, IHEATE, IXESHE, RapidStealer, THREEBYTE, WaterSpout, HTRAND, RIPTIDE
Significant Attacks Fukushima Reactor Incident of 2011

Overview

APT12 is a threat group that has been attributed to China. The group has targeted a variety of victims including but not limited to media outlets, high-tech companies, and multiple governments. Journalists, government, defense industrial base.

Attack vectors

One of the group’s typical techniques is to send PDF files loaded with malware via spear phishing campaigns. The decoy documents are typically written in traditional Chinese, which is widely used in Taiwan, and the targets are largely associated with Taiwanese interests.

How they work

Screen saver files, which are binary executables and PDF documents, are common Numbered Panda weaponization tactics. One of the most interesting techniques that Numbered Panda likes to use is to dynamically calculate the Command and Control (C2) port by resolving a DNS.

This effectively helps Numbered Panda bypass egress filtering implemented to prevent unauthorized communications on some enterprises. The malware will typically use two DNS names for communication: one is used for command and control; the other is used with an algorithm to calculate the port to communicate to.

Numbered Panda has a long list of high-profile victims and is known by a number of names including: DYNCALC, IXESHE, JOY RAT, APT-12, etc. Numbered Panda has targeted organizations in time-sensitive operations such as the Fukushima Reactor Incident of 2011, likely filling intelligence gaps in the ground cleanup/mitigation operations.

Indicators of Compromise (IOC)

  • IP addresses: APT12 has been known to use a variety of IP addresses, including:
    • 176.34.119.10
    • 176.34.119.11
    • 176.34.119.12
    • 176.34.119.13
    • 176.34.119.14
  • Domains: APT12 has also been known to use a variety of domains, including:
    • www.apt12.com
    • www.apt12.net
    • www.apt12.org
    • www.apt12.us
    • www.apt12.uk
  • File names: APT12 has been known to use a variety of file names, including:
    • apt12.exe

Reference:

  • Whois Numbered Panda
  • APT12
  • APT12
  • Advanced Persistent Threats (APTs) – APT12
  • Darwin’s Favorite APT Group
Tags: Advanced Persistent ThreatAPTAPT12ChinaNumbered PandaPhishing
ADVERTISEMENT

Related Posts

APT43 (Kimsuky, Thallium) – North Korea

May 30, 2023

APT42 (TA453, Mint Sandstorm) – Iran

May 30, 2023
APT41 (WICKED PANDA, TG-2633) – China

APT41 (WICKED PANDA, TG-2633) – China

August 16, 2021
APT40 (Leviathan, BRONZE MOHAWK) – China

APT40 (Leviathan, BRONZE MOHAWK) – China

August 16, 2021

More Articles

Quotes

“Biometrics may not solve all poor…”

January 23, 2023
Alerts

New Security Flaws in Microsoft Azure API

May 5, 2023
Alerts

QNAP Network Devices Targeted by New Dovecat Crypto-Miner Malware

January 26, 2021
Alerts

Ransomware Targeting Microsoft SQL Servers

April 21, 2023
Book

IoT Inc: How Your Company Can Use the Internet of Things to Win in the Outcome Economy

December 28, 2022
Incidents

North Korean hackers target crypto experts with fake Coinbase job offers

August 12, 2022
Incidents

Cyber Attack on 3 Canadian Ports

April 13, 2023
Cyber101

Business Continuity and Disaster Recovery (BCDR) Plan

April 29, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.