Skip to content

China (PRC) -- Cyber Threat Actors

Actor Profile at a Glance

Attribution: Ministry of State Security (MSS), PLA Strategic Support Force (SSF/now Information Support Force), contracted hackers, university affiliates Objectives: Espionage, intellectual property theft, pre-positioning for wartime disruption, political intelligence, surveillance of dissidents Activity Level: Very High -- the most prolific nation-state cyber actor by volume (ODNI 2024 Annual Threat Assessment) Key Segments Impacted: OT/IoT Security, Cloud Security, Network Security, Threat Intelligence, Identity & Access, Endpoint Security Primary Targets: US critical infrastructure, defense industrial base, telecom, semiconductor/tech IP, Five Eyes governments, ASEAN/Taiwan/Japan


Strategic Context

The People's Republic of China treats cyber operations as a core instrument of national power, integrated into a broader strategy of "informatized warfare" (信息化战争) and "intelligentized warfare" (智能化战争). Cyber capabilities serve both peacetime intelligence collection and wartime operational preparation.

Organizational Structure

PRC cyber operations are conducted by three overlapping pillars:

  1. Ministry of State Security (MSS): China's primary civilian intelligence agency. Responsible for foreign intelligence collection, counterintelligence, and economic espionage. MSS regional bureaus (e.g., Hainan State Security Department, Tianjin State Security Bureau, Jiangsu State Security) contract operations to private hackers and front companies. MSS-linked groups include APT10, APT31, APT40, and APT41 (Mandiant, 2022).

  2. PLA Strategic Support Force / Information Support Force: The military's dedicated cyber and signals intelligence arm (reorganized in 2024 as the Information Support Force). Historically organized into numbered units (e.g., Unit 61398/APT1, Unit 61486/APT2). Focused on military intelligence, defense-sector targeting, and wartime disruption capabilities (CrowdStrike Global Threat Report 2024).

  3. Contractors, Universities, and "Patriotic Hackers": MSS and PLA both leverage civilian talent. Companies like Chengdu 404 (linked to APT41), i-SOON/Anxun (leaked in 2024), and university-affiliated researchers conduct operations under state direction. The 2024 i-SOON leak revealed the scale of China's hack-for-hire ecosystem (SentinelOne, Feb 2024).

Strategic Drivers

  • Made in China 2025 / Dual Circulation: State industrial policy drives targeted IP theft in semiconductors, aerospace, biotech, AI, and advanced manufacturing to reduce reliance on foreign technology. The 2025 plan specifically targets 10 strategic sectors: next-gen IT, robotics, aerospace, maritime engineering, rail, EVs, power equipment, agricultural machinery, new materials, and biopharma (CISA Advisory AA22-158A).
  • Belt and Road Initiative (BRI): Intelligence collection on BRI partner and competitor nations, particularly in Southeast Asia, Africa, and Central Asia. Cyber operations support BRI by providing negotiating leverage and monitoring partner compliance.
  • Taiwan Contingency: Pre-positioning in US and allied critical infrastructure for potential wartime disruption -- the explicit mission of Volt Typhoon. The strategic logic: if the US intervenes in a Taiwan scenario, PRC cyber forces can disrupt logistics, communications, and energy infrastructure to slow military mobilization (CISA Advisory AA24-038A).
  • Five Year Plans: Targeting aligns with priority industries identified in China's economic plans, providing a predictable indicator of likely victim sectors. The 14th Five Year Plan (2021--2025) prioritizes quantum computing, AI, semiconductors, and space -- all sectors experiencing elevated PRC cyber targeting.
  • Surveillance of Dissidents: MSS conducts global surveillance of Uyghur, Tibetan, Falun Gong, and pro-democracy activists. Groups like Daggerfly and Fishmonger target diaspora communities, journalists, and NGOs.

Scale of Operations

The scale of PRC cyber operations dwarfs other nation-state programs. FBI Director Christopher Wray testified in 2024 that PRC hackers outnumber FBI cyber agents "by at least 50 to 1." The 2024 i-SOON leak revealed a single MSS contractor employing hundreds of hackers targeting governments across 20+ countries. The PRC's cyber workforce is estimated in the tens of thousands when combining MSS, PLA, contractor, and university-affiliated personnel (FBI Congressional Testimony, Jan 2024).

CCP Central Committee / CMCMinistry of State SecurityPLA Information Support ForceMinistry of Public SecurityRegional MSS BureausFront Companies & ContractorsDedicated Cyber UnitsSignals Intelligence UnitsContracted Hackers / Universities

Known Groups & Attribution

The following table catalogs PRC-attributed cyber threat groups. Alias proliferation across vendors makes deduplication difficult; some entries may overlap.

Group Aliases Sponsor Primary Objective Active Since Status
Volt Typhoon Vanguard Panda (CrowdStrike), Bronze Silhouette (Secureworks), Insidious Taurus (Palo Alto), Voltzite (Dragos), DEV-0391 (Microsoft) MSS (assessed) Critical infrastructure pre-positioning ~2021 Active
Salt Typhoon GhostEmperor (Kaspersky), FamousSparrow (ESET), Earth Estries (Trend Micro) MSS (assessed) Telecom espionage, wiretap access ~2019 Active
APT41 / Winnti Wicked Panda (CrowdStrike), Double Dragon, Barium (Microsoft), Blackfly (Symantec), Earth Baku (Trend Micro) MSS / Chengdu 404 Dual espionage + financial crime, supply chain ~2012 Active
APT10 Stone Panda (CrowdStrike), MenuPass (FireEye), Red Apollo (PwC), CVNX, Potassium (Microsoft) MSS / Tianjin Bureau MSP/cloud service provider targeting, IP theft ~2006 Active
APT31 Zirconium (Microsoft), Judgment Panda (CrowdStrike), Violet Typhoon, Red Kelpie MSS / Hubei Bureau Political espionage, election targeting ~2010 Active
APT40 Leviathan (FireEye), Bronze Mohawk (Secureworks), Gadolinium (Microsoft), Kryptonite Panda (CrowdStrike), TEMP.Periscope MSS / Hainan Bureau Maritime, defense, South China Sea intel ~2013 Active
APT3 Gothic Panda (CrowdStrike), Buckeye (Symantec), UPS Team, TG-0110 MSS / Guangdong Bureau Defense, telecom, technology espionage ~2007 Reduced activity post-2017 indictments
APT17 Deputy Dog (FireEye), Elderwood (Symantec), Dogfish, Sneaky Panda MSS (assessed) Tech, defense, government espionage ~2009 Low activity
Mustang Panda Bronze President (Secureworks), Stately Taurus (Palo Alto), RedDelta (Recorded Future), Earth Preta (Trend Micro), TEMP.Hex MSS (assessed) ASEAN/EU political espionage ~2014 Active
Aquatic Panda Charcoal Typhoon (Microsoft), ControlX MSS (assessed) Telecom, tech, government espionage ~2019 Active
Hafnium / Silk Typhoon Silk Typhoon (Microsoft, renamed 2023) MSS (assessed) Mass exploitation, supply chain compromise ~2017 Active
APT27 Emissary Panda (CrowdStrike), Lucky Mouse (Kaspersky), Iron Tiger (Trend Micro), Bronze Union (Secureworks), TG-3390 PLA/MSS (debated) Government, defense, tech espionage ~2010 Active
APT15 Vixen Panda (CrowdStrike), Nickel (Microsoft), Ke3chang (FireEye), Royal APT, Playful Dragon MSS (assessed) Government, diplomatic espionage ~2010 Active
Naikon Lotus Panda (CrowdStrike), Override Panda, PLA Unit 78020 (assessed) PLA (assessed) ASEAN military/government intel ~2010 Active
Gallium Granite Typhoon (Microsoft), UNSC 2814 MSS (assessed) Telecom, financial sector ~2018 Active
Earth Lusca Tag-22 (Recorded Future), Charcoal Typhoon (partial overlap) MSS / Chengdu-linked Espionage + financial crime ~2019 Active
LightBasin UNC1945 (Mandiant) PRC-nexus (assessed) Telecom infrastructure ~2016 Active
RedHotel TAG-22 variant, Earth Lusca overlap MSS (assessed) Government, tech, R&D espionage ~2019 Active
BackdoorDiplomacy CloudComputating (Palo Alto) MSS (assessed) Diplomatic, government targets ~2017 Active
Flax Typhoon Ethereal Panda (CrowdStrike), Storm-0919 (Microsoft) MSS / contractor IoT botnet, Taiwan-focused espionage ~2021 Active (botnet disrupted 2024)
APT5 Manganese (Microsoft), Keyhole Panda (CrowdStrike), TEMP.Bottle MSS (assessed) Telecom, defense, satellite tech ~2007 Active
APT1 Comment Crew, Shanghai Group, PLA Unit 61398 PLA 3rd Dept., 2nd Bureau Defense, critical infrastructure IP ~2006 Dormant post-2014 indictments
APT2 Putter Panda, PLA Unit 61486 PLA 3rd Dept., 12th Bureau Space/satellite, defense ~2007 Dormant post-indictments
Tonto Team Karma Panda (CrowdStrike), CactusPete (Kaspersky), Earth Akhlut PLA (assessed) Russia, Japan, South Korea military/gov ~2009 Active
Sharp Panda -- MSS (assessed) Southeast Asian governments ~2018 Active
Daggerfly Evasive Panda (Symantec), StormBamboo, Bronze Highland MSS (assessed) ISP-level MITM, telecom, democracy activists ~2012 Active
IronHusky -- MSS (assessed) Central Asian governments, Russia ~2017 Active
Fishmonger -- i-SOON/Anxun Government, NGO, think tank ~2019 Active

Knowledge Gap

Attribution confidence varies significantly across groups. Many "Typhoon" designations are Microsoft-specific and may overlap with existing CrowdStrike/Mandiant-tracked clusters. The 2024 i-SOON leak confirmed some linkages but also revealed previously unknown groups whose full scope is still being assessed.


How They Operate

Operational Model

PRC cyber operations follow a state-directed, contractor-executed model that is unique among nation-state actors:

  1. Tasking: MSS bureaus receive intelligence requirements derived from Five Year Plans, military modernization goals, and political priorities. These are translated into targeting packages.

  2. Execution: Operations are frequently outsourced to private companies (e.g., Chengdu 404, i-SOON) or university-affiliated hackers who maintain plausible deniability while accessing state vulnerability research.

  3. Shared Tooling Ecosystem: Unlike Russian or North Korean actors who maintain more siloed toolsets, PRC groups share malware families (ShadowPad, PlugX) across multiple clusters, complicating attribution (Recorded Future, 2023).

  4. Living-off-the-Land (LOTL) Emphasis: Post-2020, PRC actors -- especially Volt Typhoon -- have dramatically shifted toward using built-in operating system tools and legitimate software to avoid detection. This represents a deliberate tradecraft evolution in response to improved EDR capabilities (CISA AA24-038A).

  5. Edge Device Exploitation: Systematic targeting of network perimeter devices -- VPN appliances (Ivanti, Fortinet, Pulse Secure), firewalls (Sophos, Palo Alto), and routers -- as initial access and persistence mechanisms. These devices often lack EDR coverage (Sophos Pacific Rim Report, 2024).

  6. SOHO Botnet Infrastructure: Use of compromised small-office/home-office routers and IoT devices as operational relay boxes (ORBs) for command and control, making traffic appear to originate from residential ISP ranges (Mandiant, 2024).

State Intelligence\nRequirements MSS/PLA\nTasking Contractor /\nUniversity Hackers Dedicated\nPLA Units Shared Tooling\nShadowPad/PlugX Edge Device\nExploitation LOTL\nTechniques SOHO Botnet\nC2 Infrastructure Target Network\nCompromise Data Exfiltration /\nPre-positioning

Distinguishing Characteristics vs. Other Nation-States

Attribute PRC Russia North Korea Iran
Primary Objective IP theft, pre-positioning, espionage Disruption, influence ops, espionage Financial theft, espionage Regional influence, retaliation
Volume Very High (most prolific) High Moderate Moderate
Tradecraft Increasingly LOTL; shared tooling Custom malware, destructive payloads Social engineering, crypto theft Wiper malware, website defacement
Contractor Model Extensive (MSS hack-for-hire) GRU/SVR + cybercrime nexus State-controlled bureau model IRGC + contractor model
Target Breadth Broadest -- every sector Government, energy, media Financial, crypto, defense Regional rivals, diaspora
Dwell Time Very long (months to years) Variable Moderate Moderate
Destructive Intent Pre-positioning (not yet executed) Demonstrated (NotPetya, Viasat) Demonstrated (Sony) Demonstrated (Shamoon)

TTPs (MITRE ATT&CK Mapping)

The following maps PRC actor techniques to the MITRE ATT&CK framework. Techniques marked with (VT) are especially characteristic of Volt Typhoon's LOTL approach.

Initial Access

Technique ID Technique PRC Usage Notable Groups
T1190 Exploit Public-Facing Application Zero-days in VPN/firewall appliances (Ivanti CVE-2023-46805, Fortinet CVE-2022-42475, Citrix CVE-2023-3519) Volt Typhoon, APT5, APT41
T1566 Phishing / Spearphishing Targeted lures with geopolitical themes, weaponized documents Mustang Panda, APT31, APT27
T1195 Supply Chain Compromise Trojanized software updates, compromised MSPs APT41, Silk Typhoon, APT10
T1078 Valid Accounts Stolen credentials, credential stuffing, purchased from initial access brokers (VT) Volt Typhoon, Salt Typhoon, APT40
T1199 Trusted Relationship Compromise of MSPs/IT service providers to pivot to customers APT10 (Cloud Hopper), Silk Typhoon

Execution

Technique ID Technique PRC Usage Notable Groups
T1059.001 PowerShell Script execution for reconnaissance and staging (VT) Volt Typhoon, APT41, APT27
T1047 WMI Remote execution via WMI for lateral movement (VT) Volt Typhoon, APT40, APT10
T1059.003 Windows Command Shell cmd.exe for LOTL operations (VT) Volt Typhoon, most PRC groups
T1129 Shared Modules DLL side-loading for malware execution APT41, Mustang Panda, APT27
T1059.006 Python Python-based tooling and implants APT41, Earth Lusca

Persistence

Technique ID Technique PRC Usage Notable Groups
T1505.003 Web Shell China Chopper, custom ASPX/PHP shells on Exchange, IIS Hafnium/Silk Typhoon, APT40, APT27
T1053.005 Scheduled Task Scheduled tasks for callback persistence (VT) Volt Typhoon, APT41, APT10
T1542 Pre-OS Boot / Firmware Implant Firmware-level persistence on edge devices Volt Typhoon (assessed), APT41
T1098 Account Manipulation Creating/modifying accounts for persistent access Salt Typhoon, APT31, APT15
T1547.001 Registry Run Keys Autostart entries for malware persistence Mustang Panda, APT3, APT17

Privilege Escalation

Technique ID Technique PRC Usage Notable Groups
T1134 Access Token Manipulation Token theft and impersonation (VT) Volt Typhoon, APT41
T1068 Exploitation for Privilege Escalation Local privilege escalation via known CVEs APT41, APT27, Earth Lusca
T1078.002 Valid Accounts: Domain Domain admin credential compromise Salt Typhoon, Volt Typhoon, APT10

Defense Evasion

Technique ID Technique PRC Usage Notable Groups
T1218 System Binary Proxy Execution LOLBins -- rundll32, mshta, certutil for download/exec (VT) Volt Typhoon, APT41, APT27
T1070.001 Indicator Removal: Clear Windows Event Logs Log clearing to cover tracks (VT) Volt Typhoon, APT40, Salt Typhoon
T1070.006 Timestomping Modifying file timestamps to blend in APT41, APT3, Mustang Panda
T1055 Process Injection DLL injection, process hollowing APT41, APT27, Aquatic Panda
T1036 Masquerading Renaming tools to match legitimate binaries (VT) Volt Typhoon, APT10, APT40
T1562.001 Impair Defenses: Disable or Modify Tools Disabling AV/EDR, modifying firewall rules APT41, APT27

Lateral Movement

Technique ID Technique PRC Usage Notable Groups
T1021.001 RDP Remote Desktop for lateral movement (VT) Volt Typhoon, APT27, APT10
T1021.002 SMB/Windows Admin Shares File copy and execution over SMB (VT) Volt Typhoon, APT41, APT40
T1047 WMI Remote command execution (VT) Volt Typhoon, APT10
T1570 Lateral Tool Transfer Staging tools via SMB shares Most PRC groups
T1021.006 Windows Remote Management (WinRM) PowerShell remoting (VT) Volt Typhoon

Collection & Exfiltration

Technique ID Technique PRC Usage Notable Groups
T1560 Archive Collected Data RAR/7-Zip for staging (VT) Volt Typhoon, APT10, APT41
T1114 Email Collection Exchange server compromise, mailbox export Silk Typhoon, APT31, Salt Typhoon
T1056.001 Keylogging Credential harvesting via keyloggers APT41, APT27, Naikon
T1041 Exfiltration Over C2 Channel Data exfil via encrypted C2 channels Most PRC groups
T1048 Exfiltration Over Alternative Protocol DNS tunneling, HTTPS to cloud storage APT10, APT41, Earth Lusca
T1567 Exfiltration Over Web Service Staging to cloud services (OneDrive, Google Drive, Dropbox) APT41, Mustang Panda, Silk Typhoon

Command and Control

Technique ID Technique PRC Usage Notable Groups
T1090.002 External Proxy: SOHO Device Botnets Compromised routers/IoT as relay nodes (ORB networks) Volt Typhoon, Flax Typhoon, APT40
T1071.001 Application Layer Protocol: Web Protocols HTTPS C2 to blend with normal traffic Most PRC groups
T1102 Web Service C2 via GitHub, Google Docs, Dropbox APT41, Mustang Panda, Earth Lusca
T1573 Encrypted Channel Custom encrypted protocols APT10, APT41, Salt Typhoon
T1572 Protocol Tunneling DNS tunneling, KCP/FRP tunnels APT41, Earth Lusca, Volt Typhoon

Tooling Arsenal

Tool Type Custom / Shared / Commodity Description Notable Users First Seen Active?
ShadowPad Modular backdoor Shared (PRC ecosystem) Successor to Winnti backdoor; modular plugin architecture; shared across 10+ PRC groups. Widely considered a "digital quartermaster" tool APT41, Tonto Team, APT15, RedHotel, Earth Lusca 2017 Yes
PlugX / Korplug RAT Shared (PRC ecosystem) Modular RAT with DLL side-loading; longest-running PRC malware family; variants in active use for 15+ years Mustang Panda, APT10, APT27, APT3, APT15 2008 Yes
China Chopper Web shell Shared Tiny (~4KB) web shell; one of the most deployed web shells globally Silk Typhoon, APT27, APT40 2012 Yes
Winnti Backdoor Shared (PRC ecosystem) Kernel-level backdoor with rootkit capabilities; original namesake of the Winnti group APT41, APT17 2011 Yes
Cobalt Strike C2 framework Commodity (pirated) Widely used red-team tool; PRC actors use cracked copies extensively APT41, APT27, Earth Lusca, Aquatic Panda N/A Yes
ScanBox Recon framework Shared JavaScript-based reconnaissance framework for profiling targets via watering holes APT10, APT17, APT40 2014 Yes
Deadeye Loader Custom (APT41) Downloader/loader used to deploy LOWKEY and other implants APT41 2019 Yes
DUSTPAN Dropper Custom (APT41) In-memory dropper for Cobalt Strike/custom payloads APT41 2021 Yes
DUSTTRAP Loader Custom (APT41) Multi-stage loader with code-signing abuse APT41 2023 Yes
QuasarRAT RAT Commodity (open source) Open-source .NET RAT repurposed by PRC actors APT10, Mustang Panda N/A Yes
Mimikatz Credential dumper Commodity (open source) Standard credential harvesting tool Most PRC groups N/A Yes
FRP (Fast Reverse Proxy) Tunneling Commodity (open source) Used to tunnel traffic from compromised networks through SOHO relays Volt Typhoon, APT41, Earth Lusca N/A Yes
Impacket Network toolkit Commodity (open source) Python-based toolkit for SMB, WMI, Kerberos; used for LOTL lateral movement Volt Typhoon, APT41, APT27 N/A Yes
KCP Tunnel Tunneling Commodity (open source) Reliable UDP-based tunnel protocol Earth Lusca, APT41 N/A Yes
KEYPLUG Backdoor Custom (APT41) Cross-platform (Windows/Linux) backdoor with modular C2 APT41 2021 Yes
HyperBro RAT Custom (APT27) Custom RAT with DLL side-loading, screen capture, keylogging APT27 2017 Yes
TONEINS / TONESHELL Loader/Backdoor Custom (Mustang Panda) Staged loader and backdoor; primary Mustang Panda implant family Mustang Panda 2022 Yes
ntdsutil LOTL binary Built-in Windows Used to dump Active Directory database (NTDS.dit) for offline credential extraction (VT) Volt Typhoon N/A Yes
wmic LOTL binary Built-in Windows Used for remote execution and reconnaissance (VT) Volt Typhoon, APT10 N/A Yes
netsh LOTL binary Built-in Windows Port forwarding, firewall manipulation, network configuration (VT) Volt Typhoon N/A Yes
certutil LOTL binary Built-in Windows File download, base64 encoding/decoding (VT) Volt Typhoon, APT41 N/A Yes

Notable Campaigns & Operations

Campaign Year(s) Actor Target Impact Key TTPs Tools
Operation Aurora 2009--2010 APT17 / Elderwood Google, Adobe, defense firms Gmail accounts of Chinese dissidents accessed; prompted Google's partial exit from China Zero-day IE exploit, watering hole Hydraq trojan
OPM Breach 2014--2015 APT1 / related PLA cluster US Office of Personnel Management 22.1 million personnel records + 5.6 million fingerprint records stolen; largest USG breach in history Valid accounts, credential theft, data staging PlugX, Sakula
Anthem Health Breach 2015 APT19 / Deep Panda (assessed) Anthem Inc. (health insurer) 78.8 million records; healthcare PII Spearphishing, custom backdoor Derusbi
Cloud Hopper 2016--2018 APT10 Managed Service Providers globally Access to MSP customers across 12+ countries; massive IP theft from defense, finance, manufacturing Trusted relationship abuse, lateral movement to MSP clients PlugX, QuasarRAT, RedLeaves
Equifax Breach 2017 PLA Unit (indicted 2020) Equifax 145 million Americans' PII; DOJ indicted 4 PLA members Apache Struts CVE exploitation, 34 server pivot Web shells, custom tools
CCleaner Supply Chain 2017 APT41 / Barium Piriform/Avast (CCleaner users) 2.27 million installations received trojanized update; second-stage targeted tech/telecom firms Supply chain compromise, staged payload delivery ShadowPad
Operation Soft Cell 2018--2019 Gallium Global telecom providers CDR (call detail record) theft; persistent access to telecom infrastructure Web shell persistence, credential dumping China Chopper, Mimikatz, PoisonIvy
ProxyLogon / Hafnium 2021 Hafnium / Silk Typhoon Microsoft Exchange servers globally Zero-day exploitation of 4 Exchange CVEs; tens of thousands of servers compromised before patch; mass exploitation followed by selective targeting Zero-day chain (CVE-2021-26855 et al.), web shell deployment China Chopper, ASPXSpy
Volt Typhoon -- Critical Infrastructure Pre-positioning 2021--present Volt Typhoon US critical infrastructure (water, energy, telecom, transportation) Persistent LOTL access to critical infrastructure with no espionage objective; assessed as pre-positioning for wartime disruption of US military logistics LOTL exclusively, edge device exploitation, SOHO botnet C2, valid accounts ntdsutil, wmic, netsh, FRP, Impacket
Salt Typhoon -- Telecom Compromise 2023--2024 Salt Typhoon Major US telecoms (AT&T, Verizon, T-Mobile, Lumen) Access to lawful intercept systems; call records of senior US officials including presidential campaigns; described as "worst telecom hack in US history" by Sen. Warner Router/switch exploitation, credential abuse, lateral movement through telecom infrastructure GhostEmperor rootkit, custom implants
Flax Typhoon Botnet 2023--2024 Flax Typhoon IoT/SOHO devices globally (260K+ devices) Massive botnet of compromised routers, cameras, NAS devices used as C2 relay infrastructure; disrupted by FBI in Sept 2024 IoT exploitation, Mirai variant, proxy relay Modified Mirai, custom C2
APT41 Global Intrusion Campaign 2019--2023 APT41 Governments, manufacturing, tech (30+ countries) Simultaneous espionage and financially motivated operations; US DOJ indicted 5 members in 2020 Supply chain, SQL injection, spearphishing, DLL side-loading ShadowPad, Cobalt Strike, DUSTPAN, KEYPLUG
Mustang Panda -- ASEAN/EU Campaigns 2022--present Mustang Panda European and Southeast Asian government ministries, military Persistent espionage against EU diplomatic corps (especially during Russia-Ukraine war); ASEAN member state military targeting USB propagation, DLL side-loading, spearphishing with geopolitical lures PlugX, TONESHELL
Silk Typhoon -- Supply Chain Attacks 2024--2025 Silk Typhoon IT supply chain, Treasury Dept Compromised BeyondTrust remote support platform to access US Treasury Department systems; broader supply chain targeting campaign Supply chain, zero-day exploitation of remote management tools Custom web shells, Cobalt Strike
Sophos Firewall Campaign (Pacific Rim) 2018--2024 Multiple PRC groups (APT41, APT31, Volt Typhoon overlap) Sophos firewall appliances globally Years-long campaign exploiting Sophos firewall zero-days; revealed coordinated vulnerability research targeting edge devices Zero-day exploitation, firmware trojans, rootkits Asnarök trojan, custom rootkits

Primary Targets

By Sector

Sector Targeting Rationale Key Groups Notable Incidents
Defense & Aerospace Military modernization, weapons system IP, fighter jet/stealth technology APT1, APT10, APT27, APT5 F-35 program data theft, drone technology
Telecommunications Access to communications metadata, wiretap systems, surveillance of targets of interest Salt Typhoon, Gallium, LightBasin, APT10 Salt Typhoon wiretap compromise (2024)
Energy & Utilities Pre-positioning for wartime disruption, industrial process knowledge Volt Typhoon, APT1, APT40 Volt Typhoon water/energy access
Technology & Semiconductors Made in China 2025 goals, reducing foreign tech dependency APT41, APT10, APT17, Silk Typhoon Cloud Hopper, CCleaner, Aurora
Government & Diplomacy Political intelligence, foreign policy insights, personnel data APT31, Mustang Panda, APT15, BackdoorDiplomacy OPM breach, EU diplomatic targeting
Healthcare & Biotech Pharmaceutical IP, genomic data, pandemic-related research APT41, APT10, Deep Panda Anthem breach, COVID-19 vaccine research targeting
Maritime & Shipping South China Sea intelligence, naval technology, port infrastructure APT40/Leviathan Maritime research institution targeting
Financial Services Economic intelligence, fintech IP, sanctions evasion (dual-purpose) APT41, Gallium Banking sector intrusions in Southeast Asia
Academia & Think Tanks Policy research, scientific IP, talent identification APT31, Mustang Panda, Fishmonger University research theft, think tank espionage

By Geography

Region Focus Key Groups
United States Critical infrastructure, defense industrial base, technology IP, political intelligence Volt Typhoon, Salt Typhoon, APT10, APT41, Silk Typhoon
Five Eyes (UK, CA, AU, NZ) Intelligence partners, technology, parliamentary targeting APT31, APT10, APT40
Taiwan Military intelligence, political surveillance, pre-positioning for invasion scenario Flax Typhoon, APT27, multiple groups
Japan Technology IP, defense sector, economic intelligence APT10, Tonto Team, APT41
ASEAN (Vietnam, Philippines, Indonesia, Myanmar) South China Sea disputes, BRI intelligence, political influence Mustang Panda, Naikon, Sharp Panda, APT30
European Union Diplomatic intelligence (especially re: China policy), technology IP, research Mustang Panda, APT31, APT15
Central Asia BRI intelligence, political monitoring of Uyghur diaspora IronHusky, Daggerfly
India Border dispute intelligence, strategic competition monitoring APT41, Naikon, Daggerfly

Defensive Implications

PRC threat actors -- especially the LOTL-focused groups like Volt Typhoon -- present distinct challenges for defenders. Traditional signature-based detection is insufficient.

Priority Security Controls

Security Product/Control Why It Matters Against PRC Actors Relevant Segments
Network Detection and Response (NDR) LOTL techniques leave minimal endpoint artifacts but generate anomalous network patterns (unusual SMB traffic, unexpected admin tool usage across segments). NDR with behavioral analytics is critical for Volt Typhoon-style operations Network Security
EDR with Behavioral Analytics Must detect abuse of legitimate binaries (ntdsutil, wmic, certutil) -- signature-based approaches fail. Behavioral models that baseline normal admin tool usage are essential Endpoint Security
Firmware Integrity Monitoring PRC actors implant backdoors in router/firewall firmware. Integrity verification of edge device firmware is a gap in most environments OT/IoT Security
Identity Analytics / ITDR Credential theft and valid account abuse are primary techniques. Identity threat detection and response (ITDR) to detect anomalous authentication patterns is critical Identity & Access
OT/ICS Security Monitoring Volt Typhoon targets OT environments (water, energy). OT-specific network monitoring that understands industrial protocols is required OT/IoT Security
Threat Intelligence Platforms PRC actor TTPs evolve rapidly. Operationalized threat intelligence with PRC-specific detection rules is necessary for proactive defense Threat Intelligence
Zero Trust Network Architecture Microsegmentation limits lateral movement even after initial compromise. Assuming breach is the correct posture for critical infrastructure Network Security, Identity
Email Security / Anti-Phishing Mustang Panda, APT31, and others still use spearphishing as primary initial access. Advanced email filtering with sandbox detonation Email Security
ASM / External Attack Surface Management PRC groups scan for and exploit internet-facing vulnerabilities rapidly. Continuous external exposure monitoring for VPN/firewall appliances Vulnerability & ASM
Secure Access Service Edge (SASE) Consolidates network security functions at the edge; reduces the VPN appliance attack surface that PRC actors exploit Network Security, Cloud
Deception Technology / Honeypots LOTL actors that avoid malware can still be detected through interaction with decoy assets; particularly effective for lateral movement detection Endpoint, Network

Detection Engineering Recommendations

Detection Priority Matrix for PRC Threats

Tier 1 (Immediate): Focus detection on administrative tool usage anomalies -- any use of ntdsutil, wmic for remote execution, certutil for downloads, or netsh port forwarding outside of change windows should generate high-fidelity alerts.

Tier 2 (High): Monitor for web shell indicators on Exchange/IIS servers, anomalous SMB lateral movement patterns, and unexpected scheduled task creation.

Tier 3 (Ongoing): Baseline network traffic to/from edge devices (firewalls, VPNs, routers) and alert on anomalous outbound connections. Monitor for firmware modification events on network appliances.

MITRE ATT&CK Techniques to Prioritize Detection

Based on PRC actor behavior, organizations should prioritize detection engineering for:

  1. T1218 -- System Binary Proxy Execution (LOTL abuse)
  2. T1078 -- Valid Accounts (credential abuse)
  3. T1190 -- Exploit Public-Facing Application (edge device zero-days)
  4. T1505.003 -- Web Shell persistence
  5. T1047 -- WMI remote execution
  6. T1021.002 -- SMB/Windows Admin Shares lateral movement
  7. T1070.001 -- Log clearing
  8. T1090.002 -- External Proxy (SOHO botnet relay)
  9. T1560 -- Archive Collected Data (staging before exfil)
  10. T1053.005 -- Scheduled Task persistence

Sector-Specific Defensive Guidance

Critical Infrastructure Operators (Water, Energy, Transportation)

  • Deploy OT-specific network monitoring (e.g., Dragos, Claroty, Nozomi)
  • Segment IT/OT networks with unidirectional gateways where possible
  • Monitor for anomalous authentication to OT management interfaces
  • Maintain offline backups of PLC/RTU configurations
  • Conduct threat hunting specifically for Volt Typhoon indicators per CISA AA24-038A

Telecom Carriers

  • Implement enhanced monitoring of network management planes and lawful intercept systems
  • Harden router/switch management interfaces (disable unnecessary protocols, enforce MFA)
  • Deploy encrypted DNS and segment core network signaling infrastructure
  • Conduct regular threat hunts informed by Salt Typhoon IOCs per CISA AA24-305A

Defense Industrial Base

  • Implement CMMC Level 2+ controls at minimum
  • Deploy advanced email security to counter spearphishing (APT10, APT27)
  • Monitor for DLL side-loading patterns associated with PlugX/ShadowPad
  • Maintain threat intelligence subscriptions with PRC-specific coverage

Market Impact

PRC cyber activity is a primary driver of security spending in multiple segments. The scale, sophistication, and persistence of PRC operations -- combined with high-profile public disclosures -- create sustained budget pressure.

Spending Drivers

Market Dynamic PRC Threat Connection Estimated Impact
OT/ICS Security surge Volt Typhoon's confirmed pre-positioning in water, energy, and transportation infrastructure triggered emergency CISA advisories and Congressional hearings. Critical infrastructure operators now face regulatory pressure to deploy OT-specific monitoring OT security market projected to reach $25B by 2028; Volt Typhoon is the #1 cited driver in buyer conversations (Dragos Year in Review 2024)
NDR market growth LOTL techniques render traditional signature detection ineffective. NDR with behavioral analytics is the primary detection mechanism for Volt Typhoon-style activity NDR market growing at ~15% CAGR; LOTL detection is a key differentiator
Firmware / supply chain security PRC exploitation of edge device firmware (Sophos Pacific Rim campaign) and software supply chains (CCleaner, SolarWinds-adjacent) drives demand for firmware integrity and SBOM solutions Emerging niche; Eclypsium, Finite State, and others gaining traction
Managed threat hunting PRC actors maintain access for months/years (Volt Typhoon dwell time measured in years). Proactive hunting is required vs. passive monitoring MDR/threat hunting services growing at ~20% CAGR
Telecom security Salt Typhoon telecom breaches triggered FCC regulatory action and carrier security mandates Major carriers investing hundreds of millions in network security upgrades
CISA advisory-driven compliance Joint advisories (AA24-038A, AA23-144A) create de facto compliance requirements for federal contractors and critical infrastructure operators Federal CISO spending directly tied to CISA advisory response

Regulatory & Compliance Impact

PRC cyber activity has directly driven regulatory action:

  • CISA Binding Operational Directives: BOD 22-01 (Known Exploited Vulnerabilities catalog) is heavily populated with PRC-exploited CVEs, creating patching mandates for federal agencies.
  • FCC Telecom Security: Salt Typhoon breaches prompted proposed FCC rules requiring carriers to implement security plans and annual certifications (FCC, Dec 2024).
  • CMMC / Defense Industrial Base: PRC targeting of defense contractors accelerates Cybersecurity Maturity Model Certification (CMMC) requirements.
  • SEC Cyber Disclosure: Mandatory incident disclosure rules (effective Dec 2023) mean PRC breaches at publicly traded companies now require 8-K filings, increasing visibility of nation-state impacts.
  • EU NIS2 Directive: PRC targeting of EU member states contributed to the urgency of NIS2 critical infrastructure security requirements.

Key Vendors by PRC Threat Relevance

Vendor Relevance Segment
Dragos Leading OT/ICS security platform; tracks Voltzite (Volt Typhoon) as primary OT threat; deepest visibility into critical infrastructure targeting OT/IoT Security
CrowdStrike Extensive PRC actor tracking (Panda nomenclature); Falcon platform behavioral detection for LOTL; Overwatch threat hunting service Endpoint, Threat Intel
Mandiant (Google) Gold standard for PRC attribution and incident response; APT nomenclature originator; deep forensic capability Threat Intel, IR
Microsoft Typhoon nomenclature; Azure/Defender telemetry provides unique visibility into PRC targeting of cloud/hybrid environments; free Defender for some E5 customers creates competitive pressure Cloud, Endpoint, Identity
Palo Alto Networks Unit 42 threat research (Taurus nomenclature); Cortex XDR; Prisma Cloud; edge device hardening (own firewalls are also targets) Network, Cloud
Fortinet FortiGuard Labs; own FortiOS appliances are frequent PRC targets, driving rapid patching and hardening investment Network Security
Recorded Future Intelligence platform with strong PRC coverage; ShadowPad/PlugX tracking; Insikt Group research Threat Intelligence
Eclypsium Firmware integrity monitoring for network devices -- directly addresses PRC edge device exploitation gap Firmware Security
Zscaler Zero trust architecture reduces attack surface for LOTL lateral movement Network Security

Recent Activity (2024--2026)

2024

  • Jan--Feb: CISA, NSA, and FBI issue joint advisory AA24-038A warning that Volt Typhoon has been pre-positioned in US critical infrastructure for "at least five years."
  • Feb: i-SOON (Anxun) data leak exposes the internal operations of a PRC hacking contractor, revealing client relationships with MSS bureaus, targeting lists, and tool capabilities (SentinelOne).
  • Mar--Apr: APT31 indictments -- DOJ charges seven PRC nationals linked to MSS Hubei bureau for 14-year espionage campaign targeting US critics of China, government officials, and political campaigns (DOJ Press Release, Mar 2024).
  • Sep: FBI disrupts Flax Typhoon-linked botnet of 260,000+ compromised IoT devices used as C2 relay infrastructure (FBI/DOJ, Sep 2024).
  • Oct: Sophos publishes "Pacific Rim" report detailing years-long campaign by multiple PRC groups targeting Sophos firewall appliances with zero-day exploits and firmware-level backdoors (Sophos, Oct 2024).
  • Oct--Dec: Salt Typhoon telecom breaches disclosed -- compromise of AT&T, Verizon, T-Mobile, Lumen Technologies; access to lawful intercept infrastructure; call records of senior US government officials and presidential campaign staff exfiltrated (Washington Post; CISA).

2025

  • Jan: US Treasury Department breach attributed to Silk Typhoon via compromised BeyondTrust remote support platform; attackers accessed Treasury workstations and unclassified documents (Treasury notification to Congress, Jan 2025).
  • Feb: Silk Typhoon shifts to supply chain targeting -- Microsoft Threat Intelligence reports systematic compromise of IT management and remote monitoring tools as entry vector to downstream targets (Microsoft, Feb 2025).
  • Feb: Dragos Year in Review confirms Voltzite (Volt Typhoon) remained active throughout 2024 and into 2025, expanding targeting to include electric utilities and satellite communications infrastructure (Dragos OT Cybersecurity Year in Review, Feb 2025).
  • Mar: CISA issues updated guidance on PRC cyber threats to critical infrastructure, emphasizing LOTL detection and edge device hardening.
  • Q2--Q4: Continued Mustang Panda campaigns targeting European defense ministries in context of geopolitical tensions; PlugX USB propagation variant detected in multiple NATO-member government networks.

Knowledge Gap

Reporting on 2025 Q3--Q4 and 2026 activity is limited at this writing (March 2026). PRC actors are assessed to remain highly active, but specific campaign disclosures lag operational reality by 6--18 months. The following 2026 entries reflect publicly available information.

2026

  • Jan--Feb: Multiple CISA advisories reference ongoing PRC activity against US critical infrastructure; Volt Typhoon pre-positioning assessed as persistent and expanding. CISA emphasizes that eviction efforts have been only partially successful due to the depth of LOTL persistence.
  • Feb: Dragos February 2026 report indicates Voltzite activity continues with no signs of abating; new targeting of water treatment facilities observed. Dragos assesses Voltzite as the most significant threat to OT environments globally.
  • Q1: Salt Typhoon-related remediation continues at major US telecom carriers; FCC finalizes new security requirements for carrier infrastructure. Full scope of Salt Typhoon compromise still being assessed -- some carriers discovered additional intrusion vectors during remediation.
  • Q1: Congressional hearings on PRC cyber threats to critical infrastructure; bipartisan support for increased funding to CISA and sector-specific agencies for cyber defense.

Knowledge Gap

Full-year 2026 activity assessment is not yet available. The threat landscape is evolving rapidly, and readers should consult CISA Advisories, Mandiant Blog, and Microsoft Threat Intelligence Blog for the latest reporting.


Sources & Further Reading

Government Advisories & Reports

Vendor Threat Intelligence Reports

Books & Long-Form Research

  • Mandiant (2013). APT1: Exposing One of China's Cyber Espionage Units -- PDF
  • IISS (2024). Cyber Capabilities and National Power -- Country assessment for China
  • CSIS (2024). Significant Cyber Incidents -- Timeline database

Congressional Testimony & Policy

MITRE ATT&CK References

Glossary

This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.

A

Term Definition
ACL Access Control List — rules determining which users/systems can access resources
APT Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access
ASM Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets
ASPM Application Security Posture Management — unified visibility and risk management across the application lifecycle
AV Antivirus — software designed to detect, prevent, and remove malware

B

Term Definition
BAS Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls
BEC Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data

C

Term Definition
C2 Command and Control — infrastructure used by attackers to communicate with compromised systems
CASB Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers
CCPA California Consumer Privacy Act — California state law granting consumers rights over their personal data
CIAM Customer Identity and Access Management — managing and securing external customer identities and authentication
CIEM Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments
CTEM Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures
CNAPP Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle
CSPM Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks
CWPP Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless)
CVE Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities

D

Term Definition
DAST Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks
DCS Distributed Control System — a control system for managing industrial processes across multiple locations
DLP Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage
DORA Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities
DSPM Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments

E

Term Definition
EASM External Attack Surface Management — discovering and monitoring internet-facing assets for exposures
EDR Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities
EPP Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response

F/G

Term Definition
FAIR Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk
GRC Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations
GDPR General Data Protection Regulation — EU regulation on data protection and privacy for individuals

H

Term Definition
HIPAA Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information

I

Term Definition
IAB Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers
IAM Identity and Access Management — framework for managing digital identities and controlling access to resources
ICS Industrial Control System — control systems used in industrial production and critical infrastructure
IDS Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts
ITDR Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises
IoT Internet of Things — network of physical devices embedded with sensors, software, and connectivity
IPS Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic

L

Term Definition
LOTL Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection

M

Term Definition
MaaS Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals
MDR Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response
MITRE ATT&CK MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques
MSSP Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices
MFA Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource

N

Term Definition
NDR Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns
NERC CIP North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid
NGAV Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection
NIS2 Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities
NIST CSF National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk

O

Term Definition
OT Operational Technology — hardware and software that monitors and controls physical devices and processes
OWASP Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance

P

Term Definition
PAM Privileged Access Management — securing, managing, and monitoring privileged accounts and access
PCI DSS Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data
PII Personally Identifiable Information — any data that could identify a specific individual
PLC Programmable Logic Controller — an industrial computer used to control manufacturing processes

R

Term Definition
RaaS Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits
RGB Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations

S

Term Definition
SASE Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud
SAST Static Application Security Testing — analyzing source code for vulnerabilities without executing the application
SBOM Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product
SCA Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase
SCADA Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely
SD-WAN Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic
SEG Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies
SIEM Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance
SOAR Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows
SOC Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents
SOX Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies
SSE Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services
SWG Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats

T

Term Definition
TAM Total Addressable Market — the total revenue opportunity available for a product or service
TCO Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime
TIP Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data
TLS Transport Layer Security — a cryptographic protocol that provides secure communication over a network
TTP Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations

V

Term Definition
VM Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities

X

Term Definition
XDR Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email

Z

Term Definition
ZTNA Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles