threatintel
actor tracker
Map
CN · China

China actors

17 tracked

APT10

apt10

PRC state-sponsored intrusion set publicly attributed by the U.S. DOJ to the Ministry of State Security's Tianjin State Security Bureau, operating through Huaying Haitai. Best known for the Cloud Hop…

CN · ChinaAPTHigh confidence
6 aliases4 TTPs1 event

APT3

apt3

PRC state-affiliated intrusion set publicly attributed by the U.S. DOJ to the Guangzhou-based front company Boyusec (Guangzhou Bo Yu Information Technology), working in concert with the Ministry of S…

CN · ChinaAPTHigh confidence
4 aliases4 TTPs1 event

APT31

apt31

PRC state-sponsored intrusion set publicly attributed to the Ministry of State Security's Hubei State Security Department, operating through the front company Wuhan Xiaoruizhi Science and Technology…

CN · ChinaAPTHigh confidence
4 aliases4 TTPs5 events

APT40

apt40

Chinese state-sponsored cyberespionage actor publicly attributed to the Ministry of State Security (MSS) Hainan State Security Department. Targets maritime industries, defense, government, and resear…

CN · ChinaAPTHigh confidence
5 aliases4 TTPs2 events

APT41

apt41

Chinese state-affiliated group notable for blending espionage with financially-motivated operations (game-industry currency theft, cryptocurrency). Implicated in multiple software supply-chain compro…

CN · ChinaAPTHigh confidence
3 aliases4 TTPs4 events

Deep Panda

deep-panda

Chinese state-sponsored intrusion set assessed to operate on behalf of the Ministry of State Security (MSS). Best known for the OPM breach (discovered May 2014, exfiltration through April 2015) — the…

CN · ChinaAPTModerate confidence
5 aliases4 TTPs0 events

Elderwood

elderwood

Chinese cyberespionage intrusion set publicly attributed to a Beijing-based group and best known for Operation Aurora — a mid-2009 to January 2010 campaign against Google, Adobe, Juniper Networks, an…

CN · ChinaAPTModerate confidence
3 aliases4 TTPs0 events

Flax Typhoon

flax-typhoon

PRC state-affiliated intrusion set operating through Integrity Technology Group — a Beijing-based, publicly-traded cybersecurity contractor sanctioned by the U.S. Treasury OFAC in January 2025. Speci…

CN · ChinaAPTHigh confidence
2 aliases4 TTPs1 event

GTG-1002

gtg-1002

PRC state-sponsored intrusion set tracked by Anthropic under the internal designation GTG-1002, publicly disclosed in Anthropic's November 2025 threat-intelligence report as the actor behind the **fi…

CN · ChinaAPTModerate confidence
0 aliases4 TTPs1 event

Hafnium

hafnium

PRC state-sponsored intrusion set named by Microsoft for the January 2021 mass exploitation of on-prem Exchange Server via the ProxyLogon chain (CVE-2021-26855 / -26857 / -26858 / -27065). Hafnium op…

CN · ChinaAPTHigh confidence
1 aliases4 TTPs0 events

Mustang Panda

mustang-panda

PRC state-aligned intrusion set focused on espionage against European government and NGO targets, Southeast Asian government and military targets (especially around the South China Sea), Mongolia, Ta…

CN · ChinaAPTModerate confidence
5 aliases4 TTPs1 event

Naikon

naikon

PRC state-sponsored intrusion set publicly attributed by ThreatConnect and Defense Group Inc. to the People's Liberation Army Unit 78020 (Chengdu Military Region Second Technical Reconnaissance Burea…

CN · ChinaAPTModerate confidence
3 aliases4 TTPs4 events

PLA Unit 54466

pla-54466

PLA 54th Research Institute (Strategic Support Force Unit 54466) members indicted by the U.S. DOJ on 10 February 2020 for the Equifax data breach of May–July 2017. Four military personnel — Wu Zhiyon…

CN · ChinaAPTHigh confidence
1 aliases4 TTPs0 events

Salt Typhoon

salt-typhoon

PRC state-backed actor responsible for the 2024 intrusions into U.S. commercial telecommunications providers — among the most consequential telecom-targeted operations on the public record. Operates…

CN · ChinaAPTHigh confidence
3 aliases4 TTPs2 events

Spamouflage

spamouflage

PRC state-coordinated influence operation publicly attributed by Meta and Microsoft as the largest known covert online influence operation, with infrastructure and behavioural overlap with the Chines…

CN · ChinaAPTModerate confidence
4 aliases2 TTPs5 events

Storm-0558

storm-0558

PRC-attributed intrusion set identified by Microsoft in July 2023 after it forged authentication tokens using a stolen Microsoft MSA consumer signing key, enabling access to the Exchange Online mailb…

CN · ChinaAPTHigh confidence
0 aliases4 TTPs0 events

Volt Typhoon

volt-typhoon

PRC state-sponsored actor focused on pre-positioning in U.S. critical infrastructure (communications, energy, transportation, water). Heavy use of living-off-the-land techniques and small-office/home…

CN · ChinaAPTHigh confidence
2 aliases4 TTPs4 events