China (PRC) -- Cyber Threat Actors¶
Actor Profile at a Glance
Attribution: Ministry of State Security (MSS), PLA Strategic Support Force (SSF/now Information Support Force), contracted hackers, university affiliates Objectives: Espionage, intellectual property theft, pre-positioning for wartime disruption, political intelligence, surveillance of dissidents Activity Level: Very High -- the most prolific nation-state cyber actor by volume (ODNI 2024 Annual Threat Assessment) Key Segments Impacted: OT/IoT Security, Cloud Security, Network Security, Threat Intelligence, Identity & Access, Endpoint Security Primary Targets: US critical infrastructure, defense industrial base, telecom, semiconductor/tech IP, Five Eyes governments, ASEAN/Taiwan/Japan
Strategic Context¶
The People's Republic of China treats cyber operations as a core instrument of national power, integrated into a broader strategy of "informatized warfare" (信息化战争) and "intelligentized warfare" (智能化战争). Cyber capabilities serve both peacetime intelligence collection and wartime operational preparation.
Organizational Structure¶
PRC cyber operations are conducted by three overlapping pillars:
-
Ministry of State Security (MSS): China's primary civilian intelligence agency. Responsible for foreign intelligence collection, counterintelligence, and economic espionage. MSS regional bureaus (e.g., Hainan State Security Department, Tianjin State Security Bureau, Jiangsu State Security) contract operations to private hackers and front companies. MSS-linked groups include APT10, APT31, APT40, and APT41 (Mandiant, 2022).
-
PLA Strategic Support Force / Information Support Force: The military's dedicated cyber and signals intelligence arm (reorganized in 2024 as the Information Support Force). Historically organized into numbered units (e.g., Unit 61398/APT1, Unit 61486/APT2). Focused on military intelligence, defense-sector targeting, and wartime disruption capabilities (CrowdStrike Global Threat Report 2024).
-
Contractors, Universities, and "Patriotic Hackers": MSS and PLA both leverage civilian talent. Companies like Chengdu 404 (linked to APT41), i-SOON/Anxun (leaked in 2024), and university-affiliated researchers conduct operations under state direction. The 2024 i-SOON leak revealed the scale of China's hack-for-hire ecosystem (SentinelOne, Feb 2024).
Strategic Drivers¶
- Made in China 2025 / Dual Circulation: State industrial policy drives targeted IP theft in semiconductors, aerospace, biotech, AI, and advanced manufacturing to reduce reliance on foreign technology. The 2025 plan specifically targets 10 strategic sectors: next-gen IT, robotics, aerospace, maritime engineering, rail, EVs, power equipment, agricultural machinery, new materials, and biopharma (CISA Advisory AA22-158A).
- Belt and Road Initiative (BRI): Intelligence collection on BRI partner and competitor nations, particularly in Southeast Asia, Africa, and Central Asia. Cyber operations support BRI by providing negotiating leverage and monitoring partner compliance.
- Taiwan Contingency: Pre-positioning in US and allied critical infrastructure for potential wartime disruption -- the explicit mission of Volt Typhoon. The strategic logic: if the US intervenes in a Taiwan scenario, PRC cyber forces can disrupt logistics, communications, and energy infrastructure to slow military mobilization (CISA Advisory AA24-038A).
- Five Year Plans: Targeting aligns with priority industries identified in China's economic plans, providing a predictable indicator of likely victim sectors. The 14th Five Year Plan (2021--2025) prioritizes quantum computing, AI, semiconductors, and space -- all sectors experiencing elevated PRC cyber targeting.
- Surveillance of Dissidents: MSS conducts global surveillance of Uyghur, Tibetan, Falun Gong, and pro-democracy activists. Groups like Daggerfly and Fishmonger target diaspora communities, journalists, and NGOs.
Scale of Operations¶
The scale of PRC cyber operations dwarfs other nation-state programs. FBI Director Christopher Wray testified in 2024 that PRC hackers outnumber FBI cyber agents "by at least 50 to 1." The 2024 i-SOON leak revealed a single MSS contractor employing hundreds of hackers targeting governments across 20+ countries. The PRC's cyber workforce is estimated in the tens of thousands when combining MSS, PLA, contractor, and university-affiliated personnel (FBI Congressional Testimony, Jan 2024).
Known Groups & Attribution¶
The following table catalogs PRC-attributed cyber threat groups. Alias proliferation across vendors makes deduplication difficult; some entries may overlap.
| Group | Aliases | Sponsor | Primary Objective | Active Since | Status |
|---|---|---|---|---|---|
| Volt Typhoon | Vanguard Panda (CrowdStrike), Bronze Silhouette (Secureworks), Insidious Taurus (Palo Alto), Voltzite (Dragos), DEV-0391 (Microsoft) | MSS (assessed) | Critical infrastructure pre-positioning | ~2021 | Active |
| Salt Typhoon | GhostEmperor (Kaspersky), FamousSparrow (ESET), Earth Estries (Trend Micro) | MSS (assessed) | Telecom espionage, wiretap access | ~2019 | Active |
| APT41 / Winnti | Wicked Panda (CrowdStrike), Double Dragon, Barium (Microsoft), Blackfly (Symantec), Earth Baku (Trend Micro) | MSS / Chengdu 404 | Dual espionage + financial crime, supply chain | ~2012 | Active |
| APT10 | Stone Panda (CrowdStrike), MenuPass (FireEye), Red Apollo (PwC), CVNX, Potassium (Microsoft) | MSS / Tianjin Bureau | MSP/cloud service provider targeting, IP theft | ~2006 | Active |
| APT31 | Zirconium (Microsoft), Judgment Panda (CrowdStrike), Violet Typhoon, Red Kelpie | MSS / Hubei Bureau | Political espionage, election targeting | ~2010 | Active |
| APT40 | Leviathan (FireEye), Bronze Mohawk (Secureworks), Gadolinium (Microsoft), Kryptonite Panda (CrowdStrike), TEMP.Periscope | MSS / Hainan Bureau | Maritime, defense, South China Sea intel | ~2013 | Active |
| APT3 | Gothic Panda (CrowdStrike), Buckeye (Symantec), UPS Team, TG-0110 | MSS / Guangdong Bureau | Defense, telecom, technology espionage | ~2007 | Reduced activity post-2017 indictments |
| APT17 | Deputy Dog (FireEye), Elderwood (Symantec), Dogfish, Sneaky Panda | MSS (assessed) | Tech, defense, government espionage | ~2009 | Low activity |
| Mustang Panda | Bronze President (Secureworks), Stately Taurus (Palo Alto), RedDelta (Recorded Future), Earth Preta (Trend Micro), TEMP.Hex | MSS (assessed) | ASEAN/EU political espionage | ~2014 | Active |
| Aquatic Panda | Charcoal Typhoon (Microsoft), ControlX | MSS (assessed) | Telecom, tech, government espionage | ~2019 | Active |
| Hafnium / Silk Typhoon | Silk Typhoon (Microsoft, renamed 2023) | MSS (assessed) | Mass exploitation, supply chain compromise | ~2017 | Active |
| APT27 | Emissary Panda (CrowdStrike), Lucky Mouse (Kaspersky), Iron Tiger (Trend Micro), Bronze Union (Secureworks), TG-3390 | PLA/MSS (debated) | Government, defense, tech espionage | ~2010 | Active |
| APT15 | Vixen Panda (CrowdStrike), Nickel (Microsoft), Ke3chang (FireEye), Royal APT, Playful Dragon | MSS (assessed) | Government, diplomatic espionage | ~2010 | Active |
| Naikon | Lotus Panda (CrowdStrike), Override Panda, PLA Unit 78020 (assessed) | PLA (assessed) | ASEAN military/government intel | ~2010 | Active |
| Gallium | Granite Typhoon (Microsoft), UNSC 2814 | MSS (assessed) | Telecom, financial sector | ~2018 | Active |
| Earth Lusca | Tag-22 (Recorded Future), Charcoal Typhoon (partial overlap) | MSS / Chengdu-linked | Espionage + financial crime | ~2019 | Active |
| LightBasin | UNC1945 (Mandiant) | PRC-nexus (assessed) | Telecom infrastructure | ~2016 | Active |
| RedHotel | TAG-22 variant, Earth Lusca overlap | MSS (assessed) | Government, tech, R&D espionage | ~2019 | Active |
| BackdoorDiplomacy | CloudComputating (Palo Alto) | MSS (assessed) | Diplomatic, government targets | ~2017 | Active |
| Flax Typhoon | Ethereal Panda (CrowdStrike), Storm-0919 (Microsoft) | MSS / contractor | IoT botnet, Taiwan-focused espionage | ~2021 | Active (botnet disrupted 2024) |
| APT5 | Manganese (Microsoft), Keyhole Panda (CrowdStrike), TEMP.Bottle | MSS (assessed) | Telecom, defense, satellite tech | ~2007 | Active |
| APT1 | Comment Crew, Shanghai Group, PLA Unit 61398 | PLA 3rd Dept., 2nd Bureau | Defense, critical infrastructure IP | ~2006 | Dormant post-2014 indictments |
| APT2 | Putter Panda, PLA Unit 61486 | PLA 3rd Dept., 12th Bureau | Space/satellite, defense | ~2007 | Dormant post-indictments |
| Tonto Team | Karma Panda (CrowdStrike), CactusPete (Kaspersky), Earth Akhlut | PLA (assessed) | Russia, Japan, South Korea military/gov | ~2009 | Active |
| Sharp Panda | -- | MSS (assessed) | Southeast Asian governments | ~2018 | Active |
| Daggerfly | Evasive Panda (Symantec), StormBamboo, Bronze Highland | MSS (assessed) | ISP-level MITM, telecom, democracy activists | ~2012 | Active |
| IronHusky | -- | MSS (assessed) | Central Asian governments, Russia | ~2017 | Active |
| Fishmonger | -- | i-SOON/Anxun | Government, NGO, think tank | ~2019 | Active |
Knowledge Gap
Attribution confidence varies significantly across groups. Many "Typhoon" designations are Microsoft-specific and may overlap with existing CrowdStrike/Mandiant-tracked clusters. The 2024 i-SOON leak confirmed some linkages but also revealed previously unknown groups whose full scope is still being assessed.
How They Operate¶
Operational Model¶
PRC cyber operations follow a state-directed, contractor-executed model that is unique among nation-state actors:
-
Tasking: MSS bureaus receive intelligence requirements derived from Five Year Plans, military modernization goals, and political priorities. These are translated into targeting packages.
-
Execution: Operations are frequently outsourced to private companies (e.g., Chengdu 404, i-SOON) or university-affiliated hackers who maintain plausible deniability while accessing state vulnerability research.
-
Shared Tooling Ecosystem: Unlike Russian or North Korean actors who maintain more siloed toolsets, PRC groups share malware families (ShadowPad, PlugX) across multiple clusters, complicating attribution (Recorded Future, 2023).
-
Living-off-the-Land (LOTL) Emphasis: Post-2020, PRC actors -- especially Volt Typhoon -- have dramatically shifted toward using built-in operating system tools and legitimate software to avoid detection. This represents a deliberate tradecraft evolution in response to improved EDR capabilities (CISA AA24-038A).
-
Edge Device Exploitation: Systematic targeting of network perimeter devices -- VPN appliances (Ivanti, Fortinet, Pulse Secure), firewalls (Sophos, Palo Alto), and routers -- as initial access and persistence mechanisms. These devices often lack EDR coverage (Sophos Pacific Rim Report, 2024).
-
SOHO Botnet Infrastructure: Use of compromised small-office/home-office routers and IoT devices as operational relay boxes (ORBs) for command and control, making traffic appear to originate from residential ISP ranges (Mandiant, 2024).
Distinguishing Characteristics vs. Other Nation-States¶
| Attribute | PRC | Russia | North Korea | Iran |
|---|---|---|---|---|
| Primary Objective | IP theft, pre-positioning, espionage | Disruption, influence ops, espionage | Financial theft, espionage | Regional influence, retaliation |
| Volume | Very High (most prolific) | High | Moderate | Moderate |
| Tradecraft | Increasingly LOTL; shared tooling | Custom malware, destructive payloads | Social engineering, crypto theft | Wiper malware, website defacement |
| Contractor Model | Extensive (MSS hack-for-hire) | GRU/SVR + cybercrime nexus | State-controlled bureau model | IRGC + contractor model |
| Target Breadth | Broadest -- every sector | Government, energy, media | Financial, crypto, defense | Regional rivals, diaspora |
| Dwell Time | Very long (months to years) | Variable | Moderate | Moderate |
| Destructive Intent | Pre-positioning (not yet executed) | Demonstrated (NotPetya, Viasat) | Demonstrated (Sony) | Demonstrated (Shamoon) |
TTPs (MITRE ATT&CK Mapping)¶
The following maps PRC actor techniques to the MITRE ATT&CK framework. Techniques marked with (VT) are especially characteristic of Volt Typhoon's LOTL approach.
Initial Access¶
| Technique ID | Technique | PRC Usage | Notable Groups |
|---|---|---|---|
| T1190 | Exploit Public-Facing Application | Zero-days in VPN/firewall appliances (Ivanti CVE-2023-46805, Fortinet CVE-2022-42475, Citrix CVE-2023-3519) | Volt Typhoon, APT5, APT41 |
| T1566 | Phishing / Spearphishing | Targeted lures with geopolitical themes, weaponized documents | Mustang Panda, APT31, APT27 |
| T1195 | Supply Chain Compromise | Trojanized software updates, compromised MSPs | APT41, Silk Typhoon, APT10 |
| T1078 | Valid Accounts | Stolen credentials, credential stuffing, purchased from initial access brokers (VT) | Volt Typhoon, Salt Typhoon, APT40 |
| T1199 | Trusted Relationship | Compromise of MSPs/IT service providers to pivot to customers | APT10 (Cloud Hopper), Silk Typhoon |
Execution¶
| Technique ID | Technique | PRC Usage | Notable Groups |
|---|---|---|---|
| T1059.001 | PowerShell | Script execution for reconnaissance and staging (VT) | Volt Typhoon, APT41, APT27 |
| T1047 | WMI | Remote execution via WMI for lateral movement (VT) | Volt Typhoon, APT40, APT10 |
| T1059.003 | Windows Command Shell | cmd.exe for LOTL operations (VT) | Volt Typhoon, most PRC groups |
| T1129 | Shared Modules | DLL side-loading for malware execution | APT41, Mustang Panda, APT27 |
| T1059.006 | Python | Python-based tooling and implants | APT41, Earth Lusca |
Persistence¶
| Technique ID | Technique | PRC Usage | Notable Groups |
|---|---|---|---|
| T1505.003 | Web Shell | China Chopper, custom ASPX/PHP shells on Exchange, IIS | Hafnium/Silk Typhoon, APT40, APT27 |
| T1053.005 | Scheduled Task | Scheduled tasks for callback persistence (VT) | Volt Typhoon, APT41, APT10 |
| T1542 | Pre-OS Boot / Firmware Implant | Firmware-level persistence on edge devices | Volt Typhoon (assessed), APT41 |
| T1098 | Account Manipulation | Creating/modifying accounts for persistent access | Salt Typhoon, APT31, APT15 |
| T1547.001 | Registry Run Keys | Autostart entries for malware persistence | Mustang Panda, APT3, APT17 |
Privilege Escalation¶
| Technique ID | Technique | PRC Usage | Notable Groups |
|---|---|---|---|
| T1134 | Access Token Manipulation | Token theft and impersonation (VT) | Volt Typhoon, APT41 |
| T1068 | Exploitation for Privilege Escalation | Local privilege escalation via known CVEs | APT41, APT27, Earth Lusca |
| T1078.002 | Valid Accounts: Domain | Domain admin credential compromise | Salt Typhoon, Volt Typhoon, APT10 |
Defense Evasion¶
| Technique ID | Technique | PRC Usage | Notable Groups |
|---|---|---|---|
| T1218 | System Binary Proxy Execution | LOLBins -- rundll32, mshta, certutil for download/exec (VT) | Volt Typhoon, APT41, APT27 |
| T1070.001 | Indicator Removal: Clear Windows Event Logs | Log clearing to cover tracks (VT) | Volt Typhoon, APT40, Salt Typhoon |
| T1070.006 | Timestomping | Modifying file timestamps to blend in | APT41, APT3, Mustang Panda |
| T1055 | Process Injection | DLL injection, process hollowing | APT41, APT27, Aquatic Panda |
| T1036 | Masquerading | Renaming tools to match legitimate binaries (VT) | Volt Typhoon, APT10, APT40 |
| T1562.001 | Impair Defenses: Disable or Modify Tools | Disabling AV/EDR, modifying firewall rules | APT41, APT27 |
Lateral Movement¶
| Technique ID | Technique | PRC Usage | Notable Groups |
|---|---|---|---|
| T1021.001 | RDP | Remote Desktop for lateral movement (VT) | Volt Typhoon, APT27, APT10 |
| T1021.002 | SMB/Windows Admin Shares | File copy and execution over SMB (VT) | Volt Typhoon, APT41, APT40 |
| T1047 | WMI | Remote command execution (VT) | Volt Typhoon, APT10 |
| T1570 | Lateral Tool Transfer | Staging tools via SMB shares | Most PRC groups |
| T1021.006 | Windows Remote Management (WinRM) | PowerShell remoting (VT) | Volt Typhoon |
Collection & Exfiltration¶
| Technique ID | Technique | PRC Usage | Notable Groups |
|---|---|---|---|
| T1560 | Archive Collected Data | RAR/7-Zip for staging (VT) | Volt Typhoon, APT10, APT41 |
| T1114 | Email Collection | Exchange server compromise, mailbox export | Silk Typhoon, APT31, Salt Typhoon |
| T1056.001 | Keylogging | Credential harvesting via keyloggers | APT41, APT27, Naikon |
| T1041 | Exfiltration Over C2 Channel | Data exfil via encrypted C2 channels | Most PRC groups |
| T1048 | Exfiltration Over Alternative Protocol | DNS tunneling, HTTPS to cloud storage | APT10, APT41, Earth Lusca |
| T1567 | Exfiltration Over Web Service | Staging to cloud services (OneDrive, Google Drive, Dropbox) | APT41, Mustang Panda, Silk Typhoon |
Command and Control¶
| Technique ID | Technique | PRC Usage | Notable Groups |
|---|---|---|---|
| T1090.002 | External Proxy: SOHO Device Botnets | Compromised routers/IoT as relay nodes (ORB networks) | Volt Typhoon, Flax Typhoon, APT40 |
| T1071.001 | Application Layer Protocol: Web Protocols | HTTPS C2 to blend with normal traffic | Most PRC groups |
| T1102 | Web Service | C2 via GitHub, Google Docs, Dropbox | APT41, Mustang Panda, Earth Lusca |
| T1573 | Encrypted Channel | Custom encrypted protocols | APT10, APT41, Salt Typhoon |
| T1572 | Protocol Tunneling | DNS tunneling, KCP/FRP tunnels | APT41, Earth Lusca, Volt Typhoon |
Tooling Arsenal¶
| Tool | Type | Custom / Shared / Commodity | Description | Notable Users | First Seen | Active? |
|---|---|---|---|---|---|---|
| ShadowPad | Modular backdoor | Shared (PRC ecosystem) | Successor to Winnti backdoor; modular plugin architecture; shared across 10+ PRC groups. Widely considered a "digital quartermaster" tool | APT41, Tonto Team, APT15, RedHotel, Earth Lusca | 2017 | Yes |
| PlugX / Korplug | RAT | Shared (PRC ecosystem) | Modular RAT with DLL side-loading; longest-running PRC malware family; variants in active use for 15+ years | Mustang Panda, APT10, APT27, APT3, APT15 | 2008 | Yes |
| China Chopper | Web shell | Shared | Tiny (~4KB) web shell; one of the most deployed web shells globally | Silk Typhoon, APT27, APT40 | 2012 | Yes |
| Winnti | Backdoor | Shared (PRC ecosystem) | Kernel-level backdoor with rootkit capabilities; original namesake of the Winnti group | APT41, APT17 | 2011 | Yes |
| Cobalt Strike | C2 framework | Commodity (pirated) | Widely used red-team tool; PRC actors use cracked copies extensively | APT41, APT27, Earth Lusca, Aquatic Panda | N/A | Yes |
| ScanBox | Recon framework | Shared | JavaScript-based reconnaissance framework for profiling targets via watering holes | APT10, APT17, APT40 | 2014 | Yes |
| Deadeye | Loader | Custom (APT41) | Downloader/loader used to deploy LOWKEY and other implants | APT41 | 2019 | Yes |
| DUSTPAN | Dropper | Custom (APT41) | In-memory dropper for Cobalt Strike/custom payloads | APT41 | 2021 | Yes |
| DUSTTRAP | Loader | Custom (APT41) | Multi-stage loader with code-signing abuse | APT41 | 2023 | Yes |
| QuasarRAT | RAT | Commodity (open source) | Open-source .NET RAT repurposed by PRC actors | APT10, Mustang Panda | N/A | Yes |
| Mimikatz | Credential dumper | Commodity (open source) | Standard credential harvesting tool | Most PRC groups | N/A | Yes |
| FRP (Fast Reverse Proxy) | Tunneling | Commodity (open source) | Used to tunnel traffic from compromised networks through SOHO relays | Volt Typhoon, APT41, Earth Lusca | N/A | Yes |
| Impacket | Network toolkit | Commodity (open source) | Python-based toolkit for SMB, WMI, Kerberos; used for LOTL lateral movement | Volt Typhoon, APT41, APT27 | N/A | Yes |
| KCP Tunnel | Tunneling | Commodity (open source) | Reliable UDP-based tunnel protocol | Earth Lusca, APT41 | N/A | Yes |
| KEYPLUG | Backdoor | Custom (APT41) | Cross-platform (Windows/Linux) backdoor with modular C2 | APT41 | 2021 | Yes |
| HyperBro | RAT | Custom (APT27) | Custom RAT with DLL side-loading, screen capture, keylogging | APT27 | 2017 | Yes |
| TONEINS / TONESHELL | Loader/Backdoor | Custom (Mustang Panda) | Staged loader and backdoor; primary Mustang Panda implant family | Mustang Panda | 2022 | Yes |
| ntdsutil | LOTL binary | Built-in Windows | Used to dump Active Directory database (NTDS.dit) for offline credential extraction (VT) | Volt Typhoon | N/A | Yes |
| wmic | LOTL binary | Built-in Windows | Used for remote execution and reconnaissance (VT) | Volt Typhoon, APT10 | N/A | Yes |
| netsh | LOTL binary | Built-in Windows | Port forwarding, firewall manipulation, network configuration (VT) | Volt Typhoon | N/A | Yes |
| certutil | LOTL binary | Built-in Windows | File download, base64 encoding/decoding (VT) | Volt Typhoon, APT41 | N/A | Yes |
Notable Campaigns & Operations¶
| Campaign | Year(s) | Actor | Target | Impact | Key TTPs | Tools |
|---|---|---|---|---|---|---|
| Operation Aurora | 2009--2010 | APT17 / Elderwood | Google, Adobe, defense firms | Gmail accounts of Chinese dissidents accessed; prompted Google's partial exit from China | Zero-day IE exploit, watering hole | Hydraq trojan |
| OPM Breach | 2014--2015 | APT1 / related PLA cluster | US Office of Personnel Management | 22.1 million personnel records + 5.6 million fingerprint records stolen; largest USG breach in history | Valid accounts, credential theft, data staging | PlugX, Sakula |
| Anthem Health Breach | 2015 | APT19 / Deep Panda (assessed) | Anthem Inc. (health insurer) | 78.8 million records; healthcare PII | Spearphishing, custom backdoor | Derusbi |
| Cloud Hopper | 2016--2018 | APT10 | Managed Service Providers globally | Access to MSP customers across 12+ countries; massive IP theft from defense, finance, manufacturing | Trusted relationship abuse, lateral movement to MSP clients | PlugX, QuasarRAT, RedLeaves |
| Equifax Breach | 2017 | PLA Unit (indicted 2020) | Equifax | 145 million Americans' PII; DOJ indicted 4 PLA members | Apache Struts CVE exploitation, 34 server pivot | Web shells, custom tools |
| CCleaner Supply Chain | 2017 | APT41 / Barium | Piriform/Avast (CCleaner users) | 2.27 million installations received trojanized update; second-stage targeted tech/telecom firms | Supply chain compromise, staged payload delivery | ShadowPad |
| Operation Soft Cell | 2018--2019 | Gallium | Global telecom providers | CDR (call detail record) theft; persistent access to telecom infrastructure | Web shell persistence, credential dumping | China Chopper, Mimikatz, PoisonIvy |
| ProxyLogon / Hafnium | 2021 | Hafnium / Silk Typhoon | Microsoft Exchange servers globally | Zero-day exploitation of 4 Exchange CVEs; tens of thousands of servers compromised before patch; mass exploitation followed by selective targeting | Zero-day chain (CVE-2021-26855 et al.), web shell deployment | China Chopper, ASPXSpy |
| Volt Typhoon -- Critical Infrastructure Pre-positioning | 2021--present | Volt Typhoon | US critical infrastructure (water, energy, telecom, transportation) | Persistent LOTL access to critical infrastructure with no espionage objective; assessed as pre-positioning for wartime disruption of US military logistics | LOTL exclusively, edge device exploitation, SOHO botnet C2, valid accounts | ntdsutil, wmic, netsh, FRP, Impacket |
| Salt Typhoon -- Telecom Compromise | 2023--2024 | Salt Typhoon | Major US telecoms (AT&T, Verizon, T-Mobile, Lumen) | Access to lawful intercept systems; call records of senior US officials including presidential campaigns; described as "worst telecom hack in US history" by Sen. Warner | Router/switch exploitation, credential abuse, lateral movement through telecom infrastructure | GhostEmperor rootkit, custom implants |
| Flax Typhoon Botnet | 2023--2024 | Flax Typhoon | IoT/SOHO devices globally (260K+ devices) | Massive botnet of compromised routers, cameras, NAS devices used as C2 relay infrastructure; disrupted by FBI in Sept 2024 | IoT exploitation, Mirai variant, proxy relay | Modified Mirai, custom C2 |
| APT41 Global Intrusion Campaign | 2019--2023 | APT41 | Governments, manufacturing, tech (30+ countries) | Simultaneous espionage and financially motivated operations; US DOJ indicted 5 members in 2020 | Supply chain, SQL injection, spearphishing, DLL side-loading | ShadowPad, Cobalt Strike, DUSTPAN, KEYPLUG |
| Mustang Panda -- ASEAN/EU Campaigns | 2022--present | Mustang Panda | European and Southeast Asian government ministries, military | Persistent espionage against EU diplomatic corps (especially during Russia-Ukraine war); ASEAN member state military targeting | USB propagation, DLL side-loading, spearphishing with geopolitical lures | PlugX, TONESHELL |
| Silk Typhoon -- Supply Chain Attacks | 2024--2025 | Silk Typhoon | IT supply chain, Treasury Dept | Compromised BeyondTrust remote support platform to access US Treasury Department systems; broader supply chain targeting campaign | Supply chain, zero-day exploitation of remote management tools | Custom web shells, Cobalt Strike |
| Sophos Firewall Campaign (Pacific Rim) | 2018--2024 | Multiple PRC groups (APT41, APT31, Volt Typhoon overlap) | Sophos firewall appliances globally | Years-long campaign exploiting Sophos firewall zero-days; revealed coordinated vulnerability research targeting edge devices | Zero-day exploitation, firmware trojans, rootkits | Asnarök trojan, custom rootkits |
Primary Targets¶
By Sector¶
| Sector | Targeting Rationale | Key Groups | Notable Incidents |
|---|---|---|---|
| Defense & Aerospace | Military modernization, weapons system IP, fighter jet/stealth technology | APT1, APT10, APT27, APT5 | F-35 program data theft, drone technology |
| Telecommunications | Access to communications metadata, wiretap systems, surveillance of targets of interest | Salt Typhoon, Gallium, LightBasin, APT10 | Salt Typhoon wiretap compromise (2024) |
| Energy & Utilities | Pre-positioning for wartime disruption, industrial process knowledge | Volt Typhoon, APT1, APT40 | Volt Typhoon water/energy access |
| Technology & Semiconductors | Made in China 2025 goals, reducing foreign tech dependency | APT41, APT10, APT17, Silk Typhoon | Cloud Hopper, CCleaner, Aurora |
| Government & Diplomacy | Political intelligence, foreign policy insights, personnel data | APT31, Mustang Panda, APT15, BackdoorDiplomacy | OPM breach, EU diplomatic targeting |
| Healthcare & Biotech | Pharmaceutical IP, genomic data, pandemic-related research | APT41, APT10, Deep Panda | Anthem breach, COVID-19 vaccine research targeting |
| Maritime & Shipping | South China Sea intelligence, naval technology, port infrastructure | APT40/Leviathan | Maritime research institution targeting |
| Financial Services | Economic intelligence, fintech IP, sanctions evasion (dual-purpose) | APT41, Gallium | Banking sector intrusions in Southeast Asia |
| Academia & Think Tanks | Policy research, scientific IP, talent identification | APT31, Mustang Panda, Fishmonger | University research theft, think tank espionage |
By Geography¶
| Region | Focus | Key Groups |
|---|---|---|
| United States | Critical infrastructure, defense industrial base, technology IP, political intelligence | Volt Typhoon, Salt Typhoon, APT10, APT41, Silk Typhoon |
| Five Eyes (UK, CA, AU, NZ) | Intelligence partners, technology, parliamentary targeting | APT31, APT10, APT40 |
| Taiwan | Military intelligence, political surveillance, pre-positioning for invasion scenario | Flax Typhoon, APT27, multiple groups |
| Japan | Technology IP, defense sector, economic intelligence | APT10, Tonto Team, APT41 |
| ASEAN (Vietnam, Philippines, Indonesia, Myanmar) | South China Sea disputes, BRI intelligence, political influence | Mustang Panda, Naikon, Sharp Panda, APT30 |
| European Union | Diplomatic intelligence (especially re: China policy), technology IP, research | Mustang Panda, APT31, APT15 |
| Central Asia | BRI intelligence, political monitoring of Uyghur diaspora | IronHusky, Daggerfly |
| India | Border dispute intelligence, strategic competition monitoring | APT41, Naikon, Daggerfly |
Defensive Implications¶
PRC threat actors -- especially the LOTL-focused groups like Volt Typhoon -- present distinct challenges for defenders. Traditional signature-based detection is insufficient.
Priority Security Controls¶
| Security Product/Control | Why It Matters Against PRC Actors | Relevant Segments |
|---|---|---|
| Network Detection and Response (NDR) | LOTL techniques leave minimal endpoint artifacts but generate anomalous network patterns (unusual SMB traffic, unexpected admin tool usage across segments). NDR with behavioral analytics is critical for Volt Typhoon-style operations | Network Security |
| EDR with Behavioral Analytics | Must detect abuse of legitimate binaries (ntdsutil, wmic, certutil) -- signature-based approaches fail. Behavioral models that baseline normal admin tool usage are essential | Endpoint Security |
| Firmware Integrity Monitoring | PRC actors implant backdoors in router/firewall firmware. Integrity verification of edge device firmware is a gap in most environments | OT/IoT Security |
| Identity Analytics / ITDR | Credential theft and valid account abuse are primary techniques. Identity threat detection and response (ITDR) to detect anomalous authentication patterns is critical | Identity & Access |
| OT/ICS Security Monitoring | Volt Typhoon targets OT environments (water, energy). OT-specific network monitoring that understands industrial protocols is required | OT/IoT Security |
| Threat Intelligence Platforms | PRC actor TTPs evolve rapidly. Operationalized threat intelligence with PRC-specific detection rules is necessary for proactive defense | Threat Intelligence |
| Zero Trust Network Architecture | Microsegmentation limits lateral movement even after initial compromise. Assuming breach is the correct posture for critical infrastructure | Network Security, Identity |
| Email Security / Anti-Phishing | Mustang Panda, APT31, and others still use spearphishing as primary initial access. Advanced email filtering with sandbox detonation | Email Security |
| ASM / External Attack Surface Management | PRC groups scan for and exploit internet-facing vulnerabilities rapidly. Continuous external exposure monitoring for VPN/firewall appliances | Vulnerability & ASM |
| Secure Access Service Edge (SASE) | Consolidates network security functions at the edge; reduces the VPN appliance attack surface that PRC actors exploit | Network Security, Cloud |
| Deception Technology / Honeypots | LOTL actors that avoid malware can still be detected through interaction with decoy assets; particularly effective for lateral movement detection | Endpoint, Network |
Detection Engineering Recommendations¶
Detection Priority Matrix for PRC Threats
Tier 1 (Immediate): Focus detection on administrative tool usage anomalies -- any use of ntdsutil, wmic for remote execution, certutil for downloads, or netsh port forwarding outside of change windows should generate high-fidelity alerts.
Tier 2 (High): Monitor for web shell indicators on Exchange/IIS servers, anomalous SMB lateral movement patterns, and unexpected scheduled task creation.
Tier 3 (Ongoing): Baseline network traffic to/from edge devices (firewalls, VPNs, routers) and alert on anomalous outbound connections. Monitor for firmware modification events on network appliances.
MITRE ATT&CK Techniques to Prioritize Detection¶
Based on PRC actor behavior, organizations should prioritize detection engineering for:
- T1218 -- System Binary Proxy Execution (LOTL abuse)
- T1078 -- Valid Accounts (credential abuse)
- T1190 -- Exploit Public-Facing Application (edge device zero-days)
- T1505.003 -- Web Shell persistence
- T1047 -- WMI remote execution
- T1021.002 -- SMB/Windows Admin Shares lateral movement
- T1070.001 -- Log clearing
- T1090.002 -- External Proxy (SOHO botnet relay)
- T1560 -- Archive Collected Data (staging before exfil)
- T1053.005 -- Scheduled Task persistence
Sector-Specific Defensive Guidance¶
Critical Infrastructure Operators (Water, Energy, Transportation)
- Deploy OT-specific network monitoring (e.g., Dragos, Claroty, Nozomi)
- Segment IT/OT networks with unidirectional gateways where possible
- Monitor for anomalous authentication to OT management interfaces
- Maintain offline backups of PLC/RTU configurations
- Conduct threat hunting specifically for Volt Typhoon indicators per CISA AA24-038A
Telecom Carriers
- Implement enhanced monitoring of network management planes and lawful intercept systems
- Harden router/switch management interfaces (disable unnecessary protocols, enforce MFA)
- Deploy encrypted DNS and segment core network signaling infrastructure
- Conduct regular threat hunts informed by Salt Typhoon IOCs per CISA AA24-305A
Defense Industrial Base
- Implement CMMC Level 2+ controls at minimum
- Deploy advanced email security to counter spearphishing (APT10, APT27)
- Monitor for DLL side-loading patterns associated with PlugX/ShadowPad
- Maintain threat intelligence subscriptions with PRC-specific coverage
Market Impact¶
PRC cyber activity is a primary driver of security spending in multiple segments. The scale, sophistication, and persistence of PRC operations -- combined with high-profile public disclosures -- create sustained budget pressure.
Spending Drivers¶
| Market Dynamic | PRC Threat Connection | Estimated Impact |
|---|---|---|
| OT/ICS Security surge | Volt Typhoon's confirmed pre-positioning in water, energy, and transportation infrastructure triggered emergency CISA advisories and Congressional hearings. Critical infrastructure operators now face regulatory pressure to deploy OT-specific monitoring | OT security market projected to reach $25B by 2028; Volt Typhoon is the #1 cited driver in buyer conversations (Dragos Year in Review 2024) |
| NDR market growth | LOTL techniques render traditional signature detection ineffective. NDR with behavioral analytics is the primary detection mechanism for Volt Typhoon-style activity | NDR market growing at ~15% CAGR; LOTL detection is a key differentiator |
| Firmware / supply chain security | PRC exploitation of edge device firmware (Sophos Pacific Rim campaign) and software supply chains (CCleaner, SolarWinds-adjacent) drives demand for firmware integrity and SBOM solutions | Emerging niche; Eclypsium, Finite State, and others gaining traction |
| Managed threat hunting | PRC actors maintain access for months/years (Volt Typhoon dwell time measured in years). Proactive hunting is required vs. passive monitoring | MDR/threat hunting services growing at ~20% CAGR |
| Telecom security | Salt Typhoon telecom breaches triggered FCC regulatory action and carrier security mandates | Major carriers investing hundreds of millions in network security upgrades |
| CISA advisory-driven compliance | Joint advisories (AA24-038A, AA23-144A) create de facto compliance requirements for federal contractors and critical infrastructure operators | Federal CISO spending directly tied to CISA advisory response |
Regulatory & Compliance Impact¶
PRC cyber activity has directly driven regulatory action:
- CISA Binding Operational Directives: BOD 22-01 (Known Exploited Vulnerabilities catalog) is heavily populated with PRC-exploited CVEs, creating patching mandates for federal agencies.
- FCC Telecom Security: Salt Typhoon breaches prompted proposed FCC rules requiring carriers to implement security plans and annual certifications (FCC, Dec 2024).
- CMMC / Defense Industrial Base: PRC targeting of defense contractors accelerates Cybersecurity Maturity Model Certification (CMMC) requirements.
- SEC Cyber Disclosure: Mandatory incident disclosure rules (effective Dec 2023) mean PRC breaches at publicly traded companies now require 8-K filings, increasing visibility of nation-state impacts.
- EU NIS2 Directive: PRC targeting of EU member states contributed to the urgency of NIS2 critical infrastructure security requirements.
Key Vendors by PRC Threat Relevance¶
| Vendor | Relevance | Segment |
|---|---|---|
| Dragos | Leading OT/ICS security platform; tracks Voltzite (Volt Typhoon) as primary OT threat; deepest visibility into critical infrastructure targeting | OT/IoT Security |
| CrowdStrike | Extensive PRC actor tracking (Panda nomenclature); Falcon platform behavioral detection for LOTL; Overwatch threat hunting service | Endpoint, Threat Intel |
| Mandiant (Google) | Gold standard for PRC attribution and incident response; APT nomenclature originator; deep forensic capability | Threat Intel, IR |
| Microsoft | Typhoon nomenclature; Azure/Defender telemetry provides unique visibility into PRC targeting of cloud/hybrid environments; free Defender for some E5 customers creates competitive pressure | Cloud, Endpoint, Identity |
| Palo Alto Networks | Unit 42 threat research (Taurus nomenclature); Cortex XDR; Prisma Cloud; edge device hardening (own firewalls are also targets) | Network, Cloud |
| Fortinet | FortiGuard Labs; own FortiOS appliances are frequent PRC targets, driving rapid patching and hardening investment | Network Security |
| Recorded Future | Intelligence platform with strong PRC coverage; ShadowPad/PlugX tracking; Insikt Group research | Threat Intelligence |
| Eclypsium | Firmware integrity monitoring for network devices -- directly addresses PRC edge device exploitation gap | Firmware Security |
| Zscaler | Zero trust architecture reduces attack surface for LOTL lateral movement | Network Security |
Recent Activity (2024--2026)¶
2024¶
- Jan--Feb: CISA, NSA, and FBI issue joint advisory AA24-038A warning that Volt Typhoon has been pre-positioned in US critical infrastructure for "at least five years."
- Feb: i-SOON (Anxun) data leak exposes the internal operations of a PRC hacking contractor, revealing client relationships with MSS bureaus, targeting lists, and tool capabilities (SentinelOne).
- Mar--Apr: APT31 indictments -- DOJ charges seven PRC nationals linked to MSS Hubei bureau for 14-year espionage campaign targeting US critics of China, government officials, and political campaigns (DOJ Press Release, Mar 2024).
- Sep: FBI disrupts Flax Typhoon-linked botnet of 260,000+ compromised IoT devices used as C2 relay infrastructure (FBI/DOJ, Sep 2024).
- Oct: Sophos publishes "Pacific Rim" report detailing years-long campaign by multiple PRC groups targeting Sophos firewall appliances with zero-day exploits and firmware-level backdoors (Sophos, Oct 2024).
- Oct--Dec: Salt Typhoon telecom breaches disclosed -- compromise of AT&T, Verizon, T-Mobile, Lumen Technologies; access to lawful intercept infrastructure; call records of senior US government officials and presidential campaign staff exfiltrated (Washington Post; CISA).
2025¶
- Jan: US Treasury Department breach attributed to Silk Typhoon via compromised BeyondTrust remote support platform; attackers accessed Treasury workstations and unclassified documents (Treasury notification to Congress, Jan 2025).
- Feb: Silk Typhoon shifts to supply chain targeting -- Microsoft Threat Intelligence reports systematic compromise of IT management and remote monitoring tools as entry vector to downstream targets (Microsoft, Feb 2025).
- Feb: Dragos Year in Review confirms Voltzite (Volt Typhoon) remained active throughout 2024 and into 2025, expanding targeting to include electric utilities and satellite communications infrastructure (Dragos OT Cybersecurity Year in Review, Feb 2025).
- Mar: CISA issues updated guidance on PRC cyber threats to critical infrastructure, emphasizing LOTL detection and edge device hardening.
- Q2--Q4: Continued Mustang Panda campaigns targeting European defense ministries in context of geopolitical tensions; PlugX USB propagation variant detected in multiple NATO-member government networks.
Knowledge Gap
Reporting on 2025 Q3--Q4 and 2026 activity is limited at this writing (March 2026). PRC actors are assessed to remain highly active, but specific campaign disclosures lag operational reality by 6--18 months. The following 2026 entries reflect publicly available information.
2026¶
- Jan--Feb: Multiple CISA advisories reference ongoing PRC activity against US critical infrastructure; Volt Typhoon pre-positioning assessed as persistent and expanding. CISA emphasizes that eviction efforts have been only partially successful due to the depth of LOTL persistence.
- Feb: Dragos February 2026 report indicates Voltzite activity continues with no signs of abating; new targeting of water treatment facilities observed. Dragos assesses Voltzite as the most significant threat to OT environments globally.
- Q1: Salt Typhoon-related remediation continues at major US telecom carriers; FCC finalizes new security requirements for carrier infrastructure. Full scope of Salt Typhoon compromise still being assessed -- some carriers discovered additional intrusion vectors during remediation.
- Q1: Congressional hearings on PRC cyber threats to critical infrastructure; bipartisan support for increased funding to CISA and sector-specific agencies for cyber defense.
Knowledge Gap
Full-year 2026 activity assessment is not yet available. The threat landscape is evolving rapidly, and readers should consult CISA Advisories, Mandiant Blog, and Microsoft Threat Intelligence Blog for the latest reporting.
Sources & Further Reading¶
Government Advisories & Reports¶
- CISA AA24-038A: PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure
- CISA AA23-144A: People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection
- CISA AA24-305A: Enhanced Visibility and Hardening Guidance for Communications Infrastructure
- ODNI 2024 Annual Threat Assessment
- DOJ: Seven Hackers Associated with Chinese Government Charged (APT31, Mar 2024)
- DOJ: Court-Authorized Operation Disrupts Botnet (Flax Typhoon, Sep 2024)
- DOJ: Chinese Military Hackers Charged in Equifax Breach (Feb 2020)
Vendor Threat Intelligence Reports¶
- CrowdStrike 2024 Global Threat Report
- Mandiant APT41: A Dual Espionage and Cyber Crime Operation
- Mandiant: ORB Networks -- China-Nexus Espionage Operations
- Microsoft: Volt Typhoon Targets US Critical Infrastructure
- Microsoft: Silk Typhoon Targeting IT Supply Chain
- Dragos OT Cybersecurity Year in Review 2024
- Sophos: Pacific Rim -- Countering PRC Edge Device Campaigns
- SentinelOne: i-SOON Leak Analysis
- Recorded Future: ShadowPad Malware Analysis
- Palo Alto Unit 42: Volt Typhoon / Insidious Taurus
Books & Long-Form Research¶
- Mandiant (2013). APT1: Exposing One of China's Cyber Espionage Units -- PDF
- IISS (2024). Cyber Capabilities and National Power -- Country assessment for China
- CSIS (2024). Significant Cyber Incidents -- Timeline database
Congressional Testimony & Policy¶
- FBI Director Wray: The CCP Cyber Threat to the American Homeland (Jan 2024)
- FCC: Proposal to Require Telecom Carriers to Secure Networks (Dec 2024)
MITRE ATT&CK References¶
- MITRE ATT&CK -- Volt Typhoon
- MITRE ATT&CK -- APT41
- MITRE ATT&CK -- APT10
- MITRE ATT&CK -- APT40
- MITRE ATT&CK -- Mustang Panda
- MITRE ATT&CK -- APT1
- MITRE ATT&CK -- APT27
- MITRE ATT&CK -- APT3
Glossary¶
This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.
A¶
| Term | Definition |
|---|---|
| ACL | Access Control List — rules determining which users/systems can access resources |
| APT | Advanced Persistent Threat — a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access |
| ASM | Attack Surface Management — continuous discovery, inventory, and risk assessment of an organization's external-facing assets |
| ASPM | Application Security Posture Management — unified visibility and risk management across the application lifecycle |
| AV | Antivirus — software designed to detect, prevent, and remove malware |
B¶
| Term | Definition |
|---|---|
| BAS | Breach and Attack Simulation — automated tools that simulate real-world attacks to test security controls |
| BEC | Business Email Compromise — a social-engineering attack targeting employees with access to company finances or data |
C¶
| Term | Definition |
|---|---|
| C2 | Command and Control — infrastructure used by attackers to communicate with compromised systems |
| CASB | Cloud Access Security Broker — a security policy enforcement point between cloud consumers and providers |
| CCPA | California Consumer Privacy Act — California state law granting consumers rights over their personal data |
| CIAM | Customer Identity and Access Management — managing and securing external customer identities and authentication |
| CIEM | Cloud Infrastructure Entitlement Management — managing identities and privileges in cloud environments |
| CTEM | Continuous Threat Exposure Management — a program for continuously assessing and prioritizing threat exposures |
| CNAPP | Cloud-Native Application Protection Platform — integrated security for cloud-native applications across the full lifecycle |
| CSPM | Cloud Security Posture Management — continuous monitoring of cloud infrastructure for misconfigurations and compliance risks |
| CWPP | Cloud Workload Protection Platform — security for workloads running in cloud environments (VMs, containers, serverless) |
| CVE | Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities |
D¶
| Term | Definition |
|---|---|
| DAST | Dynamic Application Security Testing — testing a running application for vulnerabilities by simulating attacks |
| DCS | Distributed Control System — a control system for managing industrial processes across multiple locations |
| DLP | Data Loss Prevention — tools and processes to prevent unauthorized data exfiltration or leakage |
| DORA | Digital Operational Resilience Act — EU regulation on ICT risk management for financial entities |
| DSPM | Data Security Posture Management — discovering, classifying, and protecting sensitive data across cloud environments |
E¶
| Term | Definition |
|---|---|
| EASM | External Attack Surface Management — discovering and monitoring internet-facing assets for exposures |
| EDR | Endpoint Detection and Response — tools that monitor endpoints for threats and provide investigation and response capabilities |
| EPP | Endpoint Protection Platform — integrated endpoint security combining prevention, detection, and response |
F/G¶
| Term | Definition |
|---|---|
| FAIR | Factor Analysis of Information Risk — a quantitative model for understanding, analyzing, and measuring information risk |
| GRC | Governance, Risk, and Compliance — integrated framework for aligning IT with business goals, managing risk, and meeting regulations |
| GDPR | General Data Protection Regulation — EU regulation on data protection and privacy for individuals |
H¶
| Term | Definition |
|---|---|
| HIPAA | Health Insurance Portability and Accountability Act — US law governing the privacy and security of health information |
I¶
| Term | Definition |
|---|---|
| IAB | Initial Access Broker — specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers |
| IAM | Identity and Access Management — framework for managing digital identities and controlling access to resources |
| ICS | Industrial Control System — control systems used in industrial production and critical infrastructure |
| IDS | Intrusion Detection System — a system that monitors network traffic for suspicious activity and alerts |
| ITDR | Identity Threat Detection and Response — detecting and responding to identity-based attacks and compromises |
| IoT | Internet of Things — network of physical devices embedded with sensors, software, and connectivity |
| IPS | Intrusion Prevention System — a system that monitors and actively blocks detected threats in network traffic |
L¶
| Term | Definition |
|---|---|
| LOTL | Living Off the Land — attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection |
M¶
| Term | Definition |
|---|---|
| MaaS | Malware-as-a-Service — cybercrime business model where malware developers sell or rent their tools to other criminals |
| MDR | Managed Detection and Response — outsourced security service providing 24/7 threat monitoring, detection, and response |
| MITRE ATT&CK | MITRE Adversarial Tactics, Techniques, and Common Knowledge — a knowledge base of adversary behaviors and techniques |
| MSSP | Managed Security Service Provider — a third-party provider offering outsourced monitoring and management of security devices |
| MFA | Multi-Factor Authentication — requiring two or more verification factors to gain access to a resource |
N¶
| Term | Definition |
|---|---|
| NDR | Network Detection and Response — detecting and responding to threats by analyzing network traffic patterns |
| NERC CIP | North American Electric Reliability Corporation Critical Infrastructure Protection — security standards for the electric grid |
| NGAV | Next-Generation Antivirus — advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection |
| NIS2 | Network and Information Systems Directive 2 — updated EU directive on cybersecurity for essential and important entities |
| NIST CSF | National Institute of Standards and Technology Cybersecurity Framework — a voluntary framework for managing cybersecurity risk |
O¶
| Term | Definition |
|---|---|
| OT | Operational Technology — hardware and software that monitors and controls physical devices and processes |
| OWASP | Open Worldwide Application Security Project — a nonprofit focused on improving software security through open-source projects and guidance |
P¶
| Term | Definition |
|---|---|
| PAM | Privileged Access Management — securing, managing, and monitoring privileged accounts and access |
| PCI DSS | Payment Card Industry Data Security Standard — security standards for organizations that handle credit card data |
| PII | Personally Identifiable Information — any data that could identify a specific individual |
| PLC | Programmable Logic Controller — an industrial computer used to control manufacturing processes |
R¶
| Term | Definition |
|---|---|
| RaaS | Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits |
| RGB | Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations |
S¶
| Term | Definition |
|---|---|
| SASE | Secure Access Service Edge — converged network and security-as-a-service architecture delivered from the cloud |
| SAST | Static Application Security Testing — analyzing source code for vulnerabilities without executing the application |
| SBOM | Software Bill of Materials — a formal inventory of components, libraries, and dependencies in a software product |
| SCA | Software Composition Analysis — identifying open-source components and known vulnerabilities in a codebase |
| SCADA | Supervisory Control and Data Acquisition — a system for monitoring and controlling industrial processes remotely |
| SD-WAN | Software-Defined Wide Area Network — a virtual WAN architecture that simplifies branch networking and optimizes traffic |
| SEG | Secure Email Gateway — a solution that filters inbound and outbound email to block threats and enforce policies |
| SIEM | Security Information and Event Management — aggregating and analyzing log data for threat detection and compliance |
| SOAR | Security Orchestration, Automation, and Response — tools that automate and coordinate security operations workflows |
| SOC | Security Operations Center — a centralized team and facility for monitoring, detecting, and responding to security incidents |
| SOX | Sarbanes-Oxley Act — US law mandating financial reporting and internal control requirements for public companies |
| SSE | Security Service Edge — the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services |
| SWG | Secure Web Gateway — a solution that filters web traffic to enforce security policies and block threats |
T¶
| Term | Definition |
|---|---|
| TAM | Total Addressable Market — the total revenue opportunity available for a product or service |
| TCO | Total Cost of Ownership — the complete cost of acquiring, deploying, and operating a solution over its lifetime |
| TIP | Threat Intelligence Platform — a system for aggregating, correlating, and operationalizing threat intelligence data |
| TLS | Transport Layer Security — a cryptographic protocol that provides secure communication over a network |
| TTP | Tactics, Techniques, and Procedures — the patterns of behavior and methods used by threat actors to conduct cyber operations |
V¶
| Term | Definition |
|---|---|
| VM | Vulnerability Management — the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities |
X¶
| Term | Definition |
|---|---|
| XDR | Extended Detection and Response — unified threat detection and response across endpoints, network, cloud, and email |
Z¶
| Term | Definition |
|---|---|
| ZTNA | Zero Trust Network Access — a security model that grants access based on identity verification and least-privilege principles |