DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home APT

APT 30 ( BRONZE STERLING) – China

Reading Time: 3 mins read
in APT
Names APT30 (Mandiant), Override Panda (CrowdStrike), Raspberry Typhoon (Microsoft)
Additional Names BRONZE STERLING (SCWX CTU), BRONZE GENEVA (CTU), CTG-5326 (SCWX CTU), Naikon (Kaspersky)
Location China
Date of initial activity 2005
Suspected attribution State-sponsored
Motivation Espionage
Associated tools Lecna, BackBend, Backspace, Creamsicle, Flashflood, Gemcutter, Milkmaid, NetEagle, Orangeade, Shipshape, Spaceship.

 

Overview

APT30 is a threat group suspected to be associated with the Chinese government. While Naikon shares some characteristics with APT30, the two groups do not appear to be exact matches. APT30 is noted not only for sustained activity over a long period of time but also for successfully modifying and adapting source code to maintain the same tools, tactics and infrastructure since at least 2005.

Evidence shows that the group prioritizes targets, most likely works in shifts in a collaborative environment and builds malware from a coherent development plan. The group has had the capability to infect air-gapped networks since 2005.

Targets

Members of the Association of Southeast Asian Nations (ASEAN)

Attack vectors

APT30 uses a suite of tools that includes downloaders, backdoors, a central controller and several components designed to infect removable drives and cross air-gapped networks to steal data. APT30 frequently registers its own DNS domains for malware CnC activities.

How they work

APT30 is noted not only for sustained activity over a long period of time but also for successfully modifying and adapting source code to maintain the same tools, tactics and infrastructure since at least 2005. Evidence shows that the group prioritizes targets, most likely works in shifts in a collaborative environment and builds malware from a coherent development plan. The group has had the capability to infect air-gapped networks since 2005.

BRONZE GENEVA is a threat group that CTU researchers assess with moderate confidence operates on behalf of China and has been active since at least 2005. The group’s intent appears to be theft of political, economic and military information from commercial and government networks globally.

BRONZE GENEVA, also known in public reporting as APT30, has been observed targeting information held by Asian organizations (specifically in the South China Sea region), which is likely consistent with the intelligence gathering requirements of the Chinese state. The group appears to have developed their toolset, which includes the Lecna remote access trojan, over an extended period of time.

References:

  • Advanced Persistent Threats (APTs) – APT30
  • APT30
  • APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION

 

Tags: Advanced Persistent ThreatAPTAPT30BRONZE GENEVAChinaCyberscurityespionageFireEyeGovernmentMalwareNaikonOverride Panda
ADVERTISEMENT

Related Posts

APT43 (Kimsuky, Thallium) – North Korea

May 30, 2023

APT42 (TA453, Mint Sandstorm) – Iran

May 30, 2023
APT41 (WICKED PANDA, TG-2633) – China

APT41 (WICKED PANDA, TG-2633) – China

August 16, 2021
APT40 (Leviathan, BRONZE MOHAWK) – China

APT40 (Leviathan, BRONZE MOHAWK) – China

August 16, 2021

More Articles

Incidents

Denver schools’ staff data stolen

March 7, 2023

Vectra’s Cognito

March 19, 2021
News

Healthcare Data Breach Trends

August 23, 2023
Incidents

CoxHealth Vendor Data Breach Alert

June 22, 2023
Alerts

Over 1,300 fake AnyDesk sites push Vidar info-stealing malware

January 11, 2023
Incidents

Sonder confirms data breach, documents and other PII potentially compromised

November 25, 2022

Hacker Makes Off With $12 Million in Latest DeFi Breach

September 20, 2021

Documentary: Blockchain City (2018)

February 27, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.