APT31
PRC state-sponsored intrusion set publicly attributed to the Ministry of State Security's Hubei State Security Department, operating through the front company Wuhan Xiaoruizhi Science and Technology Company. UK and U.S. sanctioned named operators in March 2024 for a 14-year global cyberespionage campaign targeting elected officials, government critics, journalists, and democratic institutions. The Czech government publicly attributed a 2022-2024 intrusion of its Ministry of Foreign Affairs unclassified network to APT31 on 28 May 2025.
Aliases
Motivations
Target sectors
Target countries
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
5 events- AnnouncementHigh2025-05-28·NUKIB (National Cyber and Information Security Agency, Czech Republic)
Czech Republic publicly attributes multi-year MFA intrusion to APT31
The Czech government, supported by NUKIB and three Czech intelligence services, publicly attributed a cyber-espionage campaign targeting an unclassified network of the Ministry of Foreign Affairs — designated critical infrastructure — to APT31, linked to China's Ministry of State Security. The intrusion is assessed to have run since at least 2022. The Chinese Ambassador was summoned and the EU and NATO issued statements of solidarity calling on China to adhere to UN norms of responsible state behaviour in cyberspace.
attributionczech-republicmfaeu-nato - SanctionHigh2024-03-25·UK Foreign, Commonwealth & Development Office
UK sanctions APT31 front company and operators over Electoral Commission breach and parliamentary targeting
The UK Foreign, Commonwealth and Development Office sanctioned Wuhan Xiaoruizhi Science and Technology Company Limited along with Zhao Guangzong and Ni Gaobin, attributing two campaigns to APT31: a 2021-2022 compromise of the UK Electoral Commission that the NCSC assessed as highly likely conducted by a China state-affiliated actor, and a 2021 reconnaissance campaign against UK parliamentarians — many members of the Inter-Parliamentary Alliance on China. The Chinese Ambassador was summoned and 16 partner governments expressed support.
sanctionukelectoral-commissionipac - SanctionHigh2024-03-25·U.S. Department of the Treasury
Treasury sanctions Wuhan XRZ front company and two APT31 hackers for targeting US critical infrastructure
OFAC designated Wuhan Xiaoruizhi Science and Technology Company, Limited (Wuhan XRZ) — a Wuhan-based Ministry of State Security front company — along with Chinese nationals Zhao Guangzong and Ni Gaobin for their roles in APT31 cyber operations targeting US critical infrastructure. The designations were issued under Executive Order 13694, as amended, and were coordinated with a parallel UK sanctions package and a US Department of Justice indictment unsealed the same day in the Eastern District of New York charging seven APT31-affiliated nationals.
sanctionofacmsscritical-infrastructure - IndictmentHigh2024-03-25·U.S. Department of Justice
DOJ unseals indictment charging seven APT31 hackers tied to MSS Hubei State Security Department
Federal prosecutors in the Eastern District of New York unsealed an indictment charging seven Chinese nationals — Ni Gaobin, Weng Ming, Cheng Feng, Peng Yaowen, Sun Xiaohui, Xiong Wang, and Zhao Guangzong — with conspiracy to commit computer intrusions and wire fraud as members of APT31, a hacking group operated by the MSS Hubei State Security Department in Wuhan. The 14-year campaign targeted US and foreign government officials, political dissidents, journalists, IPAC parliamentarians, defense contractors, and companies in aerospace, defense, telecommunications, and other sectors.
indictmentdojmsshubei-ssd - ReportHigh2020-09-10·Microsoft
Microsoft discloses Zirconium (APT31) targeting of 2020 US presidential campaign and international affairs community
Microsoft's Customer Security & Trust team reported that Zirconium — the Microsoft alias for APT31 — had launched thousands of attacks between March and September 2020, resulting in nearly 150 compromises. The China-based group indirectly targeted the Joe Biden for President campaign via non-campaign email accounts of affiliated individuals, as well as academics at more than 15 universities and 18 international affairs organizations including the Atlantic Council and Stimson Center, using web-beacon reconnaissance tied to attacker-controlled domains.
reportelection-securityzirconiummicrosoft
Indicators of compromise
0 indicatorsRelated actors
shared ATT&CK techniques- CN · ChinaAPT102 shared techniques
- RU · RussiaAPT282 shared techniques
- IR · IranAPT332 shared techniques
- CN · ChinaAPT402 shared techniques
- CN · ChinaSalt Typhoon2 shared techniques
- RU · Russia8Base1 shared technique
References
- G0128 — APT31MITRE ATT&CK
- UK exposes attempted Russian cyber interference in politics and democratic processes (APT31 sanctions)UK Government / FCDO · 2024-03-25
- Czech Republic publicly attributes cyberattacks to China — APT31 linked to MSS targets Ministry of Foreign AffairsNÚKIB (Czechia) · 2025-05-28
cite this page
Threat Intel Tracker. (2026-05-19). APT31 — actor profile. Retrieved from https://threatintel.local/actors/apt31