ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Stone Panda, APT 10, menuPass

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Stone Panda, APT 10, menuPass

NamesStone Panda (CrowdStrike)
APT 10 (Mandiant)
menuPass Team (Symantec)
menuPass (Palo Alto)
Red Apollo (PWC)
CVNX (BAE Systems)
Potassium (Microsoft)
Hogfish (iDefense)
Happyyongzi (FireEye)
Cicada (Symantec)
Bronze Riverside (SecureWorks)
CTG-5938 (SecureWorks)
ATK 41 (Thales)
TA429 (Proofpoint)
Granite Taurus (Palo Alto)
CountryChina China
SponsorState-sponsored, Tianjin bureau of the Chinese Ministry of State Security, Huaying Haitai
MotivationInformation theft and espionage
First seen2006
DescriptionmenuPass is a threat group that appears to originate from China and has been active since approximately 2009. The group has targeted healthcare, defense, aerospace, and government sectors, and has targeted Japanese victims since at least 2014. In 2016 and 2017, the group targeted managed IT service providers, manufacturing and mining companies, and a university.

Also see Operation LiberalFace, MirrorFace and Twisted Panda.
ObservedSectors: Aerospace, Defense, Energy, Financial, Government, Healthcare, High-Tech, IT, Media, NGOs, Pharmaceutical, Telecommunications and MSPs.
Countries: Australia, Belgium, Brazil, Canada, China, Finland, France, Germany, Hong Kong, India, Israel, Italy, Japan, Montenegro, Netherlands, Norway, Philippines, Singapore, South Africa, South Korea, Sweden, Switzerland, Taiwan, Thailand, Turkey, UAE, UK, USA, Vietnam.
Tools usedAnel, BloodHound, certutil, ChChes, China Chopper, Cobalt Strike, Derusbi, DILLJUICE, DILLWEED, Ecipekac, Emdivi, EvilGrab RAT, Gh0st RAT, HTran, Impacket, Invoke the Hash, LODEINFO, Mimikatz, MiS-Type, nbtscan, P8RAT, PlugX, Poison Ivy, Poldat, PowerSploit, PowerView, PsExec, PsList, pwdump, Quarks PwDump, QuasarRAT, RedLeaves, Rubeus, SharpSploit, SodaMaster, SNUGRIDE, Trochilus RAT, WinRAR, WmiExec, Living off the Land.
Operations performedSep 2016Spear-phishing attack
Method: The attackers spoofed several sender email addresses to send spear-phishing emails, most notably public addresses associated with the Sasakawa Peace Foundation and The White House.
Target: Japanese academics working in several areas of science, along with Japanese pharmaceutical and a US-based subsidiary of a Japanese manufacturing organizations.
2016Operation “Cloud Hopper”
The campaign, which we refer to as Operation Cloud Hopper, has targeted managed IT service providers (MSPs), allowing APT10 unprecedented potential access to the intellectual property and sensitive data of those MSPs and their clients globally. A number of Japanese organizations have also been directly targeted in a separate, simultaneous campaign by the same actor
2016/2017Leveraging its global footprint, FireEye has detected APT10 activity across six continents in 2016 and 2017. APT10 has targeted or compromised manufacturing companies in India, Japan and Northern Europe; a mining company in South America; and multiple IT service providers worldwide. We believe these companies are a mix of final targets and organizations that could provide a foothold in a final target.
Feb 2017Operation “TradeSecret”
The National Foreign Trade Council (NFTC) website was allegedly infiltrated by Chinese nation-state threat actors, according to a new report from Fidelis Cybersecurity. The attack against the NFTC site has been dubbed ‘Operation TradeSecret’ by Fidelis and is seen as an attempt to gain insight into individuals closely associated with U.S trade policy activities.
2017Operation “ChessMaster”
Take for instance the self-named ChessMaster, a campaign targeting Japanese academe, technology enterprises, media outfits, managed service providers, and government agencies. It employs various poisoned pawns in the form of malware-laden spear-phishing emails containing decoy documents.
2017Operation “Soft Cell”
Earlier this year, Cybereason identified an advanced, persistent attack targeting telecommunications providers that has been underway for years, soon after deploying into the environment.
The threat actor was attempting to steal all data stored in the active directory, compromising every single username and password in the organization, along with other personally identifiable information, billing data, call detail records, credentials, email servers, geo-location of users, and more.
Nov 2017Targeted Norwegian MSP and US Companies in Sustained Campaign
A sustained cyberespionage campaign targeting at least three companies in the United States and Europe was uncovered by Recorded Future and Rapid7 between November 2017 and September 2018.
2018Operation “New Battle”
This report provides a technical overview of the bespoke RedLeaves implants leveraged by the actor in their “new battle” campaign.
Jul 2018Attack on the Japanese media sector
In July 2018, FireEye devices detected and blocked what appears to be APT10 (menuPass) activity targeting the Japanese media sector.
Jan 2019Breach of Airbus
Mar 2019Operation “A41APT”
Apr 2019In April 2019, enSilo detected what it believes to be new activity by Chinese cyber espionage group APT10. The variants discovered by enSilo are previously unknown and deploy malware that is unique to the threat actor.
Oct 2019Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign
Feb 2021Chinese hackers target Indian vaccine makers SII, Bharat Biotech, says security firm
Nov 2021Operation “Cache Panda”
A hacking group affiliated with the Chinese government is believed to have carried out a months-long attack against Taiwan’s financial sector by leveraging a vulnerability in a security software solution used by roughly 80% of all local financial organizations.
Feb 2022Cicada: Chinese APT Group Widens Targeting in Recent Espionage Activity
Counter operationsDec 2018Chinese Hackers Indicted
Jul 2020EU imposes the first ever sanctions against cyber-attacks

Last change to this card: 10 March 2024

Download this actor card in PDF or JSON format

Previous: Stealth Falcon, FruityArmor
Next: Storm-0558

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]