threatintel
actor tracker
All actors

Deep Panda

deep-panda · primary source: CrowdStrike · first observed 2010
CN · ChinaState-sponsoredModerate confidence

Chinese state-sponsored intrusion set assessed to operate on behalf of the Ministry of State Security (MSS). Best known for the OPM breach (discovered May 2014, exfiltration through April 2015) — the largest theft of U.S. government personnel records in history, exposing background-investigation files on roughly 22 million individuals with security clearances — and for the 2014 Anthem health-insurer breach exposing 78.8 million records. The group uses webshells, lateral movement via SMB, and PowerShell-based in-memory execution to maintain long-dwell access to high-value identity repositories.

Aliases

Shell CrewOtherWebMastersOtherKungFu KittensOtherBlack VineOtherG0009MITRE

Motivations

espionage

Target sectors

governmenthealthcaredefensefinancialtechnology

Target countries

USGBDEJP

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Deep Panda
  • China
  • espionage
Infrastructure
Victim
  • government
  • healthcare
  • defense
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Timeline

0 events
No timeline events recorded yet.

Indicators of compromise

0 indicators
No indicators of compromise have been cataloged for this actor yet.

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Deep Panda — actor profile. Retrieved from https://threatintel.local/actors/deep-panda

no cited activity