APT10
apt10 · primary source: MITRE · first observed 2005
CN · ChinaState-sponsoredHigh confidencelast cited Dec 19, 2018 · 7y ago
PRC state-sponsored intrusion set publicly attributed by the U.S. DOJ to the Ministry of State Security's Tianjin State Security Bureau, operating through Huaying Haitai. Best known for the Cloud Hopper campaign against managed service providers (MSPs) and cloud platforms — supply-chain compromise to pivot into downstream customer networks across aviation, satellite, automotive, biotech, pharma, and IT services. The U.S. DOJ unsealed an indictment of Zhu Hua and Zhang Shilong in December 2018.
Aliases
Stone PandaCrowdStrikeMenuPassOtherRed ApolloOtherPOTASSIUMMicrosoftBronze RiversideOtherCVNXOther
Motivations
espionage
Target sectors
managed service providersaviationsatellitebiotechnologypharmaceuticaltelecommunications
Target countries
USGBJPDEFRCAAUBRINKR
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Tools & malware
1 entryTimeline
1 eventIndicators of compromise
3 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| Name | family · UPPERCUT UPPERCUT (a.k.a. ANEL) backdoor attributed to APT10 / menuPass by MITRE ATT&CK (S0275). Deployed in long-running espionage campaigns against Japanese targets and tracked alongside the Cloud Hopper MSP intrusion set. | Sep 12, 2018 | MITRE ATT&CK |
| Name | family · RedLeaves RedLeaves is a custom RAT first publicly associated with APT10 / menuPass in PwC and BAE Systems' Operation Cloud Hopper report. The Cloud Hopper IOC annex enumerates RedLeaves implant paths such as `C:\windows\system32\RedLeaves.exe` on victim hosts. | Apr 4, 2017 | PwC UK / BAE Systems |
| Domain | Dynamic-DNS C2 hostname listed in PwC's Operation Cloud Hopper Annex A domain table. Used by APT10 across MSP-pivot intrusions documented in the 2016-2017 Cloud Hopper campaign. | Apr 4, 2017 | PwC UK / BAE Systems |
Related actors
shared ATT&CK techniques- CN · ChinaAPT403 shared techniques
- CN · ChinaAPT312 shared techniques
- IR · IranAPT332 shared techniques
- KP · DPRKBlueNoroff2 shared techniques
- ?? · UnknownScattered Spider2 shared techniques
- RU · Russia8Base1 shared technique
References
cite this page
Threat Intel Tracker. (2026-05-19). APT10 — actor profile. Retrieved from https://threatintel.local/actors/apt10
latest cited activity · 2018-12-20 · 3 cataloged indicators