APT10

Also known as: MenuPass, Stone Panda, Red Apollo, CVNX, POTASSIUM, Cicada
Affiliation China (Ministry of State Security)
Motivation Espionage
Status active
Country China
First Seen 2006
Last Seen 2024
Target Geographies Japan, United States, United Kingdom, Global

Executive Summary

APT10, also known as MenuPass and Stone Panda, is a Chinese state-sponsored cyber-espionage group affiliated with the Ministry of State Security (MSS). Active since at least 2006, the group is best known for its “Operation Cloud Hopper” campaign, which systematically targeted managed service providers (MSPs) worldwide to gain access to the networks of their clients. APT10 has targeted organizations across the technology, healthcare, aerospace, defense, and government sectors, with a sustained focus on Japan.

The group’s exploitation of trusted relationships between MSPs and their clients represented a strategic evolution in supply chain compromise tactics. In December 2018, the U.S. Department of Justice indicted two Chinese nationals associated with the MSS for their roles in APT10 operations, which compromised data from organizations in at least 12 countries.

Notable Campaigns

2014-2017 — Operation Cloud Hopper

APT10 conducted a sustained campaign targeting multiple managed service providers globally. By compromising MSP networks, the group gained indirect access to the networks of hundreds of downstream client organizations across industries including healthcare, finance, biotechnology, and government. The campaign was disclosed jointly by PwC and BAE Systems in April 2017.

2009-2018 — Technology Sector Theft

Over nearly a decade, APT10 targeted U.S. technology companies and the Jet Propulsion Laboratory (NASA JPL), exfiltrating personnel records and proprietary technology data. The 2018 DOJ indictment detailed the theft of data from over 45 technology companies and government agencies.

2019-2024 — LODEINFO Campaign Against Japan

APT10 deployed the LODEINFO backdoor in sustained campaigns against Japanese media, diplomatic, government, and defense organizations. The campaigns used spearphishing emails with Japanese-language lures and demonstrated ongoing evolution of the group’s toolset.

Technical Capabilities

APT10 employs a combination of custom and publicly available malware. PlugX serves as a primary backdoor providing remote access, file manipulation, and keylogging capabilities. LODEINFO is a more recent fileless backdoor targeting Japanese organizations, loaded through malicious Word documents. SodaMaster provides additional C2 capabilities with DLL side-loading for execution.

The group excels at sustained, low-and-slow operations. After gaining access to MSP networks, APT10 operators use legitimate administrative tools (RDP, PsExec) to move laterally without deploying additional malware, making detection difficult. Data exfiltration involves staging in compressed archives and exfiltration during off-hours to avoid detection.

APT10’s infrastructure relies on dynamic DNS services, compromised web servers for C2, and domain names mimicking legitimate services. The group regularly rotates infrastructure to evade blocking.

Attribution

The U.S. DOJ indicted Zhu Hua and Zhang Shilong, two Chinese nationals affiliated with the MSS Tianjin State Security Bureau, in December 2018. The indictment detailed APT10’s operations targeting MSPs, technology companies, and government agencies. Multiple governments including the UK, Australia, Canada, and Japan issued statements supporting the attribution.

CISA and FBI jointly published advisories on APT10 activity, providing technical indicators and TTPs. Private-sector firms including PwC, BAE Systems, and Symantec (now Broadcom) independently tracked APT10 operations and corroborated the MSS attribution based on infrastructure analysis and operational patterns.

MITRE ATT&CK Profile

Initial Access: APT10 uses trusted relationships (T1199) through compromised MSPs and spearphishing attachments (T1566.001) with industry-relevant lures for direct targeting.

Execution: DLL side-loading (T1574.002) is a hallmark technique, used to execute PlugX, LODEINFO, and SodaMaster through legitimate applications. PowerShell (T1059.001) and Windows Command Shell (T1059.003) support post-compromise activities.

Persistence: Scheduled tasks (T1053), registry run keys (T1547.001), and service creation (T1543.003) maintain persistent access.

Collection and Exfiltration: Data is compressed using RAR (T1560.001), staged in temporary directories, and exfiltrated over C2 channels (T1041) or via alternative protocols during off-hours.

Sources & References