CN

APT17

High ConfidenceHigh Threat

DeputyDog • Aurora Panda • Tailgater Team • BRONZE KEYSTONE • Dogfish • G0001 +2 more

APT17, also known as DeputyDog and Aurora Panda, is a China-based threat group that has been active since at least 2013. The group is believed to be state-sponsored and primarily engages in cyber espionage operations. APT17 has a history of targeting a wide range of organizations, including U.S. government entities, the defense industry, law firms, IT companies, and mining companies. Their campaigns have been observed globally, with a focus on the United States, Europe, and Asia. The group is known for its use of the BLACKCOFFEE malware, which it has employed in various campaigns. One notable tactic involved leveraging Microsoft's TechNet portal for command-and-control (C2) communications, a technique designed to obfuscate their infrastructure and prolong their operations. This method highlights their ability to adapt and use legitimate services for malicious purposes. Over the years, APT17 has been associated with a variety of other malware families and tools, including ShadowPad and PlugX, indicating a broad and evolving toolkit.

Origin: China
Sponsor: State-Sponsored
Active: 2013 - Present
Victims: 100+ organizations
Advanced
Active
Espionage
Risk Assessment
79
Composite Risk Score
High Risk
ARCS Compliance80
Escalation Risk78
Grievance Index75
Infrastructure Impact82
History & Evolution

APT17, also known as DeputyDog and Aurora Panda, is a China-based threat group that has been active since at least 2013. The group is believed to be state-sponsored and primarily engages in cyber espionage operations. APT17 has a history of targeting a wide range of organizations, including U.S. government entities, the defense industry, law firms, IT companies, and mining companies. Their campaigns have been observed globally, with a focus on the United States, Europe, and Asia. The group is known for its use of the BLACKCOFFEE malware, which it has employed in various campaigns. One notable tactic involved leveraging Microsoft's TechNet portal for command-and-control (C2) communications, a technique designed to obfuscate their infrastructure and prolong their operations. This method highlights their ability to adapt and use legitimate services for malicious purposes. Over the years, APT17 has been associated with a variety of other malware families and tools, including ShadowPad and PlugX, indicating a broad and evolving toolkit.

Targeting

Target Sectors

GovernmentDefenseLaw FirmsInformation TechnologyMiningNon-government organizations

Target Regions

United StatesEuropeAsia
Attribution & Affiliations

Attributed to State-Sponsored (China). Attribution confidence: High.

Intelligence Assessment
High
Threat Level
Highly
Targeting
Highly
Adaptability
High
Persistence
Continuous
Op Tempo
Active
Status

Future Outlook

APT17 is expected to continue operations targeting Government.

Timeline of Key Events
2013
Major

First observed activity

2024
Major

Ongoing operations