APT Intelligence Directory
Institute for Critical Infrastructure Cybersecurity
CN

APT30

High ConfidenceHigh Threat

Naikon • Bronze Mahogany • Override Panda

APT30 is a sophisticated threat group with suspected ties to the Chinese government that has been active for over a decade, primarily focusing on cyber espionage against targets in Southeast Asia and India. The group is known for its consistent and long-term operations, utilizing a well-maintained and customized set of malware tools to steal sensitive political, economic, and military information. Their sustained activities, coupled with a coherent development plan for their malware, suggest a well-organized and state-sponsored effort. APT30's targeting of government and commercial entities, as well as journalists, aligns with the strategic interests of the Chinese government, particularly concerning regional security and political issues. The group's operational methodology is characterized by a professional and structured approach, including the use of a two-stage command and control infrastructure to maintain stealth and scalability. They employ a range of custom malware, such as the BACKSPACE and NETEAGLE backdoors, along with tools designed to exfiltrate data from air-gapped networks. APT30's notable campaigns often coincide with significant political events, such as ASEAN summits, and their social engineering tactics are tailored to regional political and military themes. The group's ability to operate for such an extended period without significant changes to their core tools and tactics underscores their effectiveness and the persistent nature of their mission.

Origin: China
Sponsor: State-Sponsored
Active: circa 2005 - Present
Victims: 100+ organizations
Advanced
Active
Espionage
Risk Assessment
79
Composite Risk Score
High Risk
ARCS Compliance80
Escalation Risk78
Grievance Index75
Infrastructure Impact82
History & Evolution

APT30 is a sophisticated threat group with suspected ties to the Chinese government that has been active for over a decade, primarily focusing on cyber espionage against targets in Southeast Asia and India. The group is known for its consistent and long-term operations, utilizing a well-maintained and customized set of malware tools to steal sensitive political, economic, and military information. Their sustained activities, coupled with a coherent development plan for their malware, suggest a well-organized and state-sponsored effort. APT30's targeting of government and commercial entities, as well as journalists, aligns with the strategic interests of the Chinese government, particularly concerning regional security and political issues. The group's operational methodology is characterized by a professional and structured approach, including the use of a two-stage command and control infrastructure to maintain stealth and scalability. They employ a range of custom malware, such as the BACKSPACE and NETEAGLE backdoors, along with tools designed to exfiltrate data from air-gapped networks. APT30's notable campaigns often coincide with significant political events, such as ASEAN summits, and their social engineering tactics are tailored to regional political and military themes. The group's ability to operate for such an extended period without significant changes to their core tools and tactics underscores their effectiveness and the persistent nature of their mission.

Targeting

Target Sectors

GovernmentDefenseTechnologyFinancial ServicesAerospaceTelecommunicationsMedia

Target Regions

Southeast AsiaIndia
Attribution & Affiliations

Attributed to State-Sponsored (China). Attribution confidence: High.

Intelligence Assessment
High
Threat Level
Highly
Targeting
Highly
Adaptability
High
Persistence
Continuous
Op Tempo
Active
Status

Future Outlook

APT30 is expected to continue operations targeting Government.

Timeline of Key Events
circa 2005
Major

First observed activity

2024
Major

Ongoing operations