threatintel
actor tracker
All actors

APT31

apt31 · primary source: MITRE · first observed 2009
CN · ChinaState-sponsoredHigh confidencelast cited May 27, 2025 · 12mo ago

PRC state-sponsored intrusion set publicly attributed to the Ministry of State Security's Hubei State Security Department, operating through the front company Wuhan Xiaoruizhi Science and Technology Company. UK and U.S. sanctioned named operators in March 2024 for a 14-year global cyberespionage campaign targeting elected officials, government critics, journalists, and democratic institutions. The Czech government publicly attributed a 2022-2024 intrusion of its Ministry of Foreign Affairs unclassified network to APT31 on 28 May 2025.

Aliases

ZirconiumMicrosoftViolet TyphoonMicrosoftJudgment PandaCrowdStrikeBronze VinewoodOther

Motivations

espionage

Target sectors

governmentdiplomaticjournalismdissidentsngo

Target countries

USGBCZNONZFIDEBE

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • APT31
  • China
  • espionage
Infrastructure
Victim
  • government
  • diplomatic
  • journalism
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Timeline

5 events
  1. AnnouncementHigh2025-05-28·NUKIB (National Cyber and Information Security Agency, Czech Republic)

    Czech Republic publicly attributes multi-year MFA intrusion to APT31

    The Czech government, supported by NUKIB and three Czech intelligence services, publicly attributed a cyber-espionage campaign targeting an unclassified network of the Ministry of Foreign Affairs — designated critical infrastructure — to APT31, linked to China's Ministry of State Security. The intrusion is assessed to have run since at least 2022. The Chinese Ambassador was summoned and the EU and NATO issued statements of solidarity calling on China to adhere to UN norms of responsible state behaviour in cyberspace.

    attributionczech-republicmfaeu-nato
  2. SanctionHigh2024-03-25·UK Foreign, Commonwealth & Development Office

    UK sanctions APT31 front company and operators over Electoral Commission breach and parliamentary targeting

    The UK Foreign, Commonwealth and Development Office sanctioned Wuhan Xiaoruizhi Science and Technology Company Limited along with Zhao Guangzong and Ni Gaobin, attributing two campaigns to APT31: a 2021-2022 compromise of the UK Electoral Commission that the NCSC assessed as highly likely conducted by a China state-affiliated actor, and a 2021 reconnaissance campaign against UK parliamentarians — many members of the Inter-Parliamentary Alliance on China. The Chinese Ambassador was summoned and 16 partner governments expressed support.

    sanctionukelectoral-commissionipac
  3. SanctionHigh2024-03-25·U.S. Department of the Treasury

    Treasury sanctions Wuhan XRZ front company and two APT31 hackers for targeting US critical infrastructure

    OFAC designated Wuhan Xiaoruizhi Science and Technology Company, Limited (Wuhan XRZ) — a Wuhan-based Ministry of State Security front company — along with Chinese nationals Zhao Guangzong and Ni Gaobin for their roles in APT31 cyber operations targeting US critical infrastructure. The designations were issued under Executive Order 13694, as amended, and were coordinated with a parallel UK sanctions package and a US Department of Justice indictment unsealed the same day in the Eastern District of New York charging seven APT31-affiliated nationals.

    sanctionofacmsscritical-infrastructure
  4. IndictmentHigh2024-03-25·U.S. Department of Justice

    DOJ unseals indictment charging seven APT31 hackers tied to MSS Hubei State Security Department

    Federal prosecutors in the Eastern District of New York unsealed an indictment charging seven Chinese nationals — Ni Gaobin, Weng Ming, Cheng Feng, Peng Yaowen, Sun Xiaohui, Xiong Wang, and Zhao Guangzong — with conspiracy to commit computer intrusions and wire fraud as members of APT31, a hacking group operated by the MSS Hubei State Security Department in Wuhan. The 14-year campaign targeted US and foreign government officials, political dissidents, journalists, IPAC parliamentarians, defense contractors, and companies in aerospace, defense, telecommunications, and other sectors.

    indictmentdojmsshubei-ssd
  5. ReportHigh2020-09-10·Microsoft

    Microsoft discloses Zirconium (APT31) targeting of 2020 US presidential campaign and international affairs community

    Microsoft's Customer Security & Trust team reported that Zirconium — the Microsoft alias for APT31 — had launched thousands of attacks between March and September 2020, resulting in nearly 150 compromises. The China-based group indirectly targeted the Joe Biden for President campaign via non-campaign email accounts of affiliated individuals, as well as academics at more than 15 universities and 18 international affairs organizations including the Atlantic Council and Stimson Center, using web-beacon reconnaissance tied to attacker-controlled domains.

    reportelection-securityzirconiummicrosoft

Indicators of compromise

0 indicators
No indicators of compromise have been cataloged for this actor yet.

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). APT31 — actor profile. Retrieved from https://threatintel.local/actors/apt31

latest cited activity · 2025-05-28