threatintel
actor tracker
All actors
MITRE ATT&CK technique

T1071.001

View the official technique description on attack.mitre.org

Tracked actors using this technique · 11

APT3

apt3

PRC state-affiliated intrusion set publicly attributed by the U.S. DOJ to the Guangzhou-based front company Boyusec (Guangzhou Bo Yu Information Technology), working in concert with the Ministry of S…

CN · ChinaAPTHigh confidence
4 aliases4 TTPs1 event

APT31

apt31

PRC state-sponsored intrusion set publicly attributed to the Ministry of State Security's Hubei State Security Department, operating through the front company Wuhan Xiaoruizhi Science and Technology…

CN · ChinaAPTHigh confidence
4 aliases4 TTPs5 events

APT37

apt37

DPRK state-sponsored actor publicly attributed to North Korea's Ministry of State Security (MSS). Conducts espionage against South Korean public and private sector targets and, to a lesser extent, Ja…

KP · DPRKAPTModerate confidence
5 aliases4 TTPs1 event

APT39

apt39

Iranian state-affiliated intrusion set publicly attributed to Rana Intelligence Computing — an MOIS (Ministry of Intelligence and Security) front company sanctioned by the U.S. Treasury OFAC in Septe…

IR · IranAPTHigh confidence
3 aliases4 TTPs1 event

APT41

apt41

Chinese state-affiliated group notable for blending espionage with financially-motivated operations (game-industry currency theft, cryptocurrency). Implicated in multiple software supply-chain compro…

CN · ChinaAPTHigh confidence
3 aliases4 TTPs4 events

Gamaredon

gamaredon

Russian state-sponsored intrusion set publicly attributed by the Security Service of Ukraine (SBU) to FSB officers based in Russian-occupied Crimea. The longest-running publicly-documented intrusion…

RU · RussiaAPTHigh confidence
6 aliases4 TTPs6 events

Lazarus Group

lazarus-group

DPRK state-sponsored umbrella set associated with the Reconnaissance General Bureau. Mixes financially-motivated operations (including major cryptocurrency exchange thefts and SWIFT-network bank intr…

KP · DPRKAPTHigh confidence
3 aliases4 TTPs8 events

Mustang Panda

mustang-panda

PRC state-aligned intrusion set focused on espionage against European government and NGO targets, Southeast Asian government and military targets (especially around the South China Sea), Mongolia, Ta…

CN · ChinaAPTModerate confidence
5 aliases4 TTPs1 event

Naikon

naikon

PRC state-sponsored intrusion set publicly attributed by ThreatConnect and Defense Group Inc. to the People's Liberation Army Unit 78020 (Chengdu Military Region Second Technical Reconnaissance Burea…

CN · ChinaAPTModerate confidence
3 aliases4 TTPs4 events

Salt Typhoon

salt-typhoon

PRC state-backed actor responsible for the 2024 intrusions into U.S. commercial telecommunications providers — among the most consequential telecom-targeted operations on the public record. Operates…

CN · ChinaAPTHigh confidence
3 aliases4 TTPs2 events

Turla

turla

Russian state-sponsored actor publicly attributed to FSB Center 16. One of the longest-running espionage sets on record, known for the Snake (Uroburos) implant — a sophisticated peer-to-peer covert c…

RU · RussiaAPTHigh confidence
5 aliases4 TTPs2 events