threatintel
actor tracker
All actors

APT10

apt10 · primary source: MITRE · first observed 2005
CN · ChinaState-sponsoredHigh confidencelast cited Dec 19, 2018 · 7y ago

PRC state-sponsored intrusion set publicly attributed by the U.S. DOJ to the Ministry of State Security's Tianjin State Security Bureau, operating through Huaying Haitai. Best known for the Cloud Hopper campaign against managed service providers (MSPs) and cloud platforms — supply-chain compromise to pivot into downstream customer networks across aviation, satellite, automotive, biotech, pharma, and IT services. The U.S. DOJ unsealed an indictment of Zhu Hua and Zhang Shilong in December 2018.

Aliases

Stone PandaCrowdStrikeMenuPassOtherRed ApolloOtherPOTASSIUMMicrosoftBronze RiversideOtherCVNXOther

Motivations

espionage

Target sectors

managed service providersaviationsatellitebiotechnologypharmaceuticaltelecommunications

Target countries

USGBJPDEFRCAAUBRINKR

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • APT10
  • China
  • espionage
Infrastructure
  • domainnow.yourtrap.com
Victim
  • managed service providers
  • aviation
  • satellite
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Tools & malware

1 entry

Timeline

1 event

Indicators of compromise

3 indicators
csv
TypeValueFirst seenSource
Name
UPPERCUT
family · UPPERCUT
UPPERCUT (a.k.a. ANEL) backdoor attributed to APT10 / menuPass by MITRE ATT&CK (S0275). Deployed in long-running espionage campaigns against Japanese targets and tracked alongside the Cloud Hopper MSP intrusion set.
Sep 12, 2018MITRE ATT&CK
Name
RedLeaves
family · RedLeaves
RedLeaves is a custom RAT first publicly associated with APT10 / menuPass in PwC and BAE Systems' Operation Cloud Hopper report. The Cloud Hopper IOC annex enumerates RedLeaves implant paths such as `C:\windows\system32\RedLeaves.exe` on victim hosts.
Apr 4, 2017PwC UK / BAE Systems
Domain
domainnow[.]yourtrap[.]com
Dynamic-DNS C2 hostname listed in PwC's Operation Cloud Hopper Annex A domain table. Used by APT10 across MSP-pivot intrusions documented in the 2016-2017 Cloud Hopper campaign.
Apr 4, 2017PwC UK / BAE Systems

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). APT10 — actor profile. Retrieved from https://threatintel.local/actors/apt10

latest cited activity · 2018-12-20 · 3 cataloged indicators