Chinese Threat Actors: What Defenders Need to Know

Chinese Threat Actors: What Defenders Need to Know
Chinese state-sponsored cyber activity has shifted to industrialized, shared covert networks of compromised SOHO routers, IoT devices, and end-of-life edge appliances that route reconnaissance, C2, and exfiltration through geographically local exit nodes to frustrate detection and attribution. The ecosystem leverages an industrial contractor model, a shared malware/tooling economy (e.g., ShadowPad, PlugX), and advanced tradecraft such as DLL sideloading and hypervisor/UEFI implants to enable scale and persistence. #ShadowPad #KV-Botnet

Keypoints

  • Chinese state-sponsored operations have industrialized into shared covert networks (Operational Relay Boxes) built from compromised SOHO routers, IoT devices, and EOL edge appliances to obfuscate attribution and blend into local traffic.
  • Major state entities (MSS, PLA, Ministry of Public Security) plus commercial contractors and hack-for-hire firms collaborate across campaigns, enabling scalable, plausible-deniability operations.
  • Common initial access vectors now emphasize rapid exploitation of internet-facing appliances (Ivanti, Fortinet, Cisco IOS XE, Juniper, Citrix, Exchange, SharePoint, PAN-OS) often within days of CVE disclosure.
  • A shared malware/tooling economy (ShadowPad, PlugX, HyperBro, Cobalt Strike, China Chopper) drives cross-group reuse of implants, RATs, web shells, and loaders, complicating attribution by artifact alone.
  • Post-compromise tradecraft relies heavily on DLL sideloading, living-off-the-land binaries, web shells for persistence, and infrastructure/hypervisor/UEFI implants for deep stealth and long dwell.
  • Notable clusters include Volt Typhoon (KV-Botnet relay model, OT pre-positioning), UNC3886 (hypervisor and network appliance implants), APT41 (UEFI Moonbounce), and Storm-2603 (SharePoint ToolShell → Warlock ransomware).
  • Defensive priorities: treat covert networks as first-class threats, enforce rapid patching of edge appliances, replace EOL devices, harden identity/cloud planes (phishing-resistant MFA, API key hygiene), and hunt for behavior-based signs (LOLBin abuse, DLL sideloading, web shells).

MITRE Techniques

  • [T1566.001 ] Spearphishing Attachment – Used as an initial access vector: ‘spear-phishing emails’ (e.g., Mustang Panda, APT3).
  • [T1566.002 ] Spearphishing Link – Employed to deliver web-based lures and credential phishes: ‘credential phishing campaigns’ (APT31).
  • [T1203 ] Exploitation for Client Execution – Groups weaponize zero-days and N-day flaws for code execution: ‘early and aggressive use of browser and Adobe Flash zero-day exploits’ (APT3).
  • [T1071.001 ] Application Layer Protocol: Web Protocols – C2 and data exfiltration often use web protocols and cloud APIs: ‘abuse of Microsoft Graph and cloud identity APIs’ (Silk Typhoon) and cloud storage (Mustang Panda).
  • [T1078 ] Valid Accounts – Credential-based access and reuse of stolen credentials: ‘abuse of valid accounts in Microsoft 365 and Microsoft Entra ID’ (APT31 and others).
  • [T1021.002 ] Remote Services: SMB/Windows Admin Shares – Used for lateral movement in enterprise environments: ‘lateral movement using stolen credentials and legitimate administrative tools’ (Gallium).
  • [T1199 ] Trusted Relationship – Supply-chain and trusted third-party compromises (MSP compromises, carrier trust abuses): ‘compromised MSPs to gain trusted access’ (APT10) and ‘exploiting trust relationships between interconnected carriers’ (Liminal Panda).
  • [T1053.005 ] Scheduled Task/Job – Persistence via scheduled tasks and job scheduling: ‘scheduled tasks … serving as the most common methods’ (cross-group persistence guidance).
  • [T1190 ] Exploit Public-Facing Application – Mass exploitation of internet-facing appliances and services: ‘mass-exploited within hours or days of public CVE disclosure’ (UNC5221, multiple groups).
  • [T1059.003 ] Command and Scripting Interpreter: Windows Command Shell – Post-exploitation command execution via shell: ‘use of native Windows binaries’ (Volt Typhoon).
  • [T1059.001 ] Command and Scripting Interpreter: PowerShell – Extensive use of PowerShell for execution and living-off-the-land: ‘PowerShell’ logging recommended and ‘custom PowerShell-based toolchains’ (Aquatic Panda).
  • [T1547.001 ] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder – Common persistence via registry and startup mechanisms: ‘registry Run keys serving as the most common methods’ (persistence guidance).
  • [T1003 ] OS Credential Dumping – Credential harvesting via Mimikatz and NTDS.dit extraction: ‘Mimikatz and LSASS dumping remain standard’ and ‘NTDS.dit extraction using ntdsutil’ (Volt Typhoon signature).
  • [T1598.002 ] Acquire Infrastructure: (infrastructure acquisition sub-technique) – Use of large-scale shared botnets and covert networks: ‘large, continuously refreshed networks of compromised SOHO routers’ (ORB networks, KV-Botnet, Raptor Train).
  • [T1204.002 ] User Execution: Malicious Link – Lures delivered to users to trigger execution: ‘tracking pixels, reconnaissance beacons, and credential phishing campaigns’ (APT31).
  • [T1090.003 ] Proxy: Multi-hop Proxy or External Proxy – Routing through multi-hop compromised SOHO devices to obfuscate origin: ‘traffic … exits through a geographically local node near the target’ (ORB networks).
  • [T1584.005 ] Compromise Infrastructure: (sub-technique related to third-party compromise) – Use of contractor/front companies and MSP compromise: ‘operation Cloud Hopper … compromised MSPs’ (APT10).
  • [T1505.003 ] Server Software Component: Web Shell – Deployment of web shells on public-facing servers for persistence: ‘web shells on public-facing servers remain a primary persistence mechanism’ (China Chopper, ASPXSpy, BUSHWALK).
  • [T1071 ] Application Layer Protocol (general) – DNS- and web-based C2 channels: ‘DNS-based C2 appears in Ke3chang …’ (Ke3chang, APT40).
  • [T1041 ] Exfiltration Over Alternative Protocol – Use of non-standard exfiltration channels and proxying: ‘exfiltration through geographically local exit nodes’ (ORB networks).
  • [T1486 ] Data Encrypted for Impact (Ransomware) – Observed dual-use where espionage activity is followed by ransomware (Warlock): ‘followed by ransomware deployment, particularly Warlock ransomware’ (Storm-2603).
  • [T1102 ] Web Service – Abuse of cloud storage and web services for staging and C2: ‘leverages cloud platforms such as Google Drive and Dropbox’ (Mustang Panda).
  • [T1091 ] Replication Through Removable Media – USB-based propagation in low-visibility environments: ‘USB-based propagation techniques, deploying worms’ (Mustang Panda, HIUPAN).
  • [T1071.004 ] Application Layer Protocol: DNS – DNS-based C2 and exfiltration: ‘RoyalDNS’ (Ke3chang) and DNS manipulation by Evasive Panda.
  • [T1114 ] Email Collection – Mailbox access and systematic collection following spear-phishing: ‘credential harvesting, mailbox access, and systematic data collection’ (Ke3chang).
  • [T1005 ] Data from Local System – Targeted data collection and staged archival exfiltration: ‘exfiltration … performed through carefully staged and compressed archive files’ (Naikon).
  • [T1560.001 ] Archive Collected Data: Archive via standard compression – Use of compressed archives to minimize detection during exfiltration: ‘staged and compressed archive files’ (Naikon).
  • [T1059.004 ] Command and Scripting Interpreter: Unix Shell – Appliance and Linux endpoint command interpreters used by UNC5221 and others: ‘distinctive set of web shells and lightweight loaders … on appliance filesystems’ (UNC5221).
  • [T1552.004 ] Unsecured Credentials: Cloud Accounts – Theft and abuse of API keys and OAuth tokens for cloud lateral movement: ‘abuses stolen API keys, OAuth tokens, and privileged credentials’ (Silk Typhoon).
  • [T1070.004 ] Indicator Removal on Host: File Deletion – Artifact cleanup and stealthy post-compromise hygiene: ‘infrastructure rotation and artifact cleanup’ (ToddyCat).
  • [T1542.003 ] Modify Firmware – Firmware and infrastructure implants on network devices and routers: ‘firmware- and infrastructure-level implants … Junos OS backdoors’ (UNC3886, Salt Typhoon).
  • [T1070 ] Indicator Removal on Host (general) – Low-noise operations and cleanup to avoid detection: ‘operators maintain strong operational security through infrastructure rotation and artifact cleanup’ (ToddyCat).
  • [T1014 ] Rootkit – Use of kernel/hypervisor/rootkit implants for deep persistence: ‘REPTILE Linux kernel rootkit, MEDUSA rootkit’ (UNC3886).
  • [T1036 ] Masquerading – DLL sideloading and signed binary abuse to evade detection: ‘DLL sideloading via legitimate signed executables’ (Mustang Panda).
  • [T1571 ] Non-Standard Port – Use of non-standard or tunneled channels such as FRP and Earthworm: ‘tools such as FastReverseProxy (FRP), Earthworm’ (Volt Typhoon).
  • [T1027.003 ] Obfuscated Files or Information: Steganography – Use of steganographic payloads embedded in images: ’embedding second-stage payloads within PNG images using least-significant-bit encoding’ (Worok).
  • [T1140 ] Deobfuscate/Decode Files or Information – Steganography and multi-stage loader decoding: ‘steganographic stager’ (Worok).
  • [T1056 ] Input Capture – Keylogging and spyware for long-term surveillance: ‘PAKLOG keylogger’ (Mustang Panda) and mobile/macOS spyware (Evasive Panda).
  • [T1055 ] Process Injection – Process injection techniques used in some backdoors and loaders: ‘passive backdoors that do not beacon outbound until receiving operator traffic’ (ToddyCat passive listeners).
  • [T1595 ] Active Scanning – Use of ScanBox and reconnaissance frameworks to fingerprint targets prior to exploitation: ‘leverages the ScanBox reconnaissance framework to fingerprint users’ (Aquatic Panda).
  • [T1195.002 ] Compromise Software Supply Chain: Server Software Component – Supply chain compromise of update infrastructure and ISPs for trojanized updates: ‘intercept and modify software update traffic, replacing legitimate updates with trojanized payloads’ (Evasive Panda).
  • [T1557 ] Adversary-in-the-Middle – ISP and network-level manipulation for traffic interception: ‘network-level supply chain attacks, including compromise of internet service providers and DNS poisoning’ (Evasive Panda).
  • [T1040 ] Network Sniffing – Telecom protocol abuse and subscriber data collection via carrier compromise: ‘compromise of telecom operators … collection of Call Detail Records (CDRs)’ (Gallium).

Indicators of Compromise

  • [Malware / Tools ] Examples of common implant families and tools referenced as IOCs – ShadowPad, PlugX, China Chopper, and Cobalt Strike.
  • [Botnet / Covert Network ] Named covert networks used as operational relay infrastructure – KV-Botnet (used by Volt Typhoon), Raptor Train (peaked ~200,000 devices).
  • [Vulnerable Appliances / Products ] Frequently targeted internet-facing equipment and services (useful for detection/pivot hunts) – Ivanti Connect Secure, Cisco IOS XE, Fortinet FortiOS, and NetGear ProSAFE.
  • [Web shells / Appliance shells ] Persistence artifacts observed on servers and appliances – China Chopper, ASPXSpy, BUSHWALK (Ivanti-specific shell).
  • [UEFI / Hypervisor implants ] Indicators of deep persistence at firmware/infrastructure layer – Moonbounce (UEFI implant), VIRTUALPITA / VIRTUALPIE (ESXi implants), MEDUSA (rootkit).
  • [CVE Identifiers ] Vulnerabilities commonly exploited (context for timely patching, often observed in exploitation) – CVE-2021-26855 (Exchange ProxyLogon), CVE-2021-44228 (Log4Shell), and numerous Ivanti/Citrix/VMware/FortiOS CVEs.


Read more: https://www.picussecurity.com/resource/blog/chinese-threat-actors-what-defenders-need-to-know