Threat Actor Profile
High APT
Description

APT5 is a China-based espionage actor that has been active since at least 2007 primarily targeting the telecommunications, aerospace, and defense industries throughout the U.S., Europe, and Asia. APT5 has displayed advanced tradecraft and significant interest in compromising networking devices and their underlying software including through the use of zero-day exploits.(Citation: NSA APT5 Citrix Threat Hunting December 2022)(Citation: Microsoft East Asia Threats September 2023)(Citation: Mandiant Pulse Secure Zero-Day April 2021)(Citation: Mandiant Pulse Secure Update May 2021)(Citation: FireEye Southeast Asia Threat Landscape March 2015)(Citation: Mandiant Advanced Persistent Threats)

Confidence Score
90%
Known Aliases
APT5 Mulberry Typhoon MANGANESE BRONZE FLEETWOOD Keyhole Panda UNC2630
Tags
mitre-attack stix-2.1 intrusion-set
First Seen

Unknown

Last Updated

Unknown

Active Status
Active
Created

April 29, 2026

MITRE ATT&CK Techniques (29)
T1056.001 - Keylogging
Collection
T1074.001 - Local Data Staging
Collection
T1560.001 - Archive via Utility
Collection
T1003.001 - LSASS Memory
Credential Access
T1003.002 - Security Account Manager
Credential Access
T1036.005 - Match Legitimate Resource Name or Locat…
Defense Evasion
T1055 - Process Injection
Defense Evasion
T1070 - Indicator Removal
Defense Evasion
T1070.003 - Clear Command History
Defense Evasion
T1070.004 - File Deletion
Defense Evasion
T1070.006 - Timestomp
Defense Evasion
T1078.002 - Domain Accounts
Defense Evasion
T1078.004 - Cloud Accounts
Defense Evasion
T1562.006 - Indicator Blocking
Defense Evasion
T1049 - System Network Connections Discovery
Discovery
T1057 - Process Discovery
Discovery
T1083 - File and Directory Discovery
Discovery
T1654 - Log Enumeration
Discovery
T1053.003 - Cron
Execution
T1059.001 - PowerShell
Execution
T1059.003 - Windows Command Shell
Execution
T1190 - Exploit Public-Facing Application
Initial Access
T1021.001 - Remote Desktop Protocol
Lateral Movement
T1021.004 - SSH
Lateral Movement
T1098.007 - Additional Local or Domain Groups
Persistence
T1136.001 - Local Account
Persistence
T1505.003 - Web Shell
Persistence
T1554 - Compromise Host Software Binary
Persistence
T1583.005 - Botnet
Resource Development
Indicators of Compromise

Loading IOCs…

IOC KQL for Sentinel
STIX Data
{'aliases': ['APT5',
             'Mulberry Typhoon',
             'MANGANESE',
             'BRONZE FLEETWOOD',
             'Keyhole Panda',
             'UNC2630'],
 'created': '2024-02-05T19:27:35.655Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': '[APT5](https://attack.mitre.org/groups/G1023) is a '
                'China-based espionage actor that has been active since at '
                'least 2007 primarily targeting the telecommunications, '
                'aerospace, and defense industries throughout the U.S., '
                'Europe, and Asia. '
                '[APT5](https://attack.mitre.org/groups/G1023) has displayed '
                'advanced tradecraft and significant interest in compromising '
                'networking devices and their underlying software including '
                'through the use of zero-day exploits.(Citation: NSA APT5 '
                'Citrix Threat Hunting December 2022)(Citation: Microsoft East '
                'Asia Threats September 2023)(Citation: Mandiant Pulse Secure '
                'Zero-Day April 2021)(Citation: Mandiant Pulse Secure Update '
                'May 2021)(Citation: FireEye Southeast Asia Threat Landscape '
                'March 2015)(Citation: Mandiant Advanced Persistent Threats)  ',
 'external_references': [{'external_id': 'G1023',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/groups/G1023'},
                         {'description': '(Citation: Microsoft Threat Actor '
                                         'Naming July 2023)(Citation: '
                                         'Microsoft East Asia Threats '
                                         'September 2023)',
                          'source_name': 'Mulberry Typhoon'},
                         {'description': '(Citation: Microsoft Threat Actor '
                                         'Naming July 2023)(Citation: NSA APT5 '
                                         'Citrix Threat Hunting December 2022)',
                          'source_name': 'MANGANESE'},
                         {'description': '(Citation: Microsoft Threat Actor '
                                         'Naming July 2023)(Citation: '
                                         'Secureworks BRONZE FLEETWOOD '
                                         'Profile)',
                          'source_name': 'Keyhole Panda'},
                         {'description': '(Citation: NSA APT5 Citrix Threat '
                                         'Hunting December 2022)',
                          'source_name': 'UNC2630'},
                         {'description': '(Citation: Secureworks BRONZE '
                                         'FLEETWOOD Profile)',
                          'source_name': 'BRONZE FLEETWOOD'},
                         {'description': 'FireEye. (2015, March). SOUTHEAST '
                                         'ASIA: AN EVOLVING CYBER THREAT '
                                         'LANDSCAPE. Retrieved February 5, '
                                         '2024.',
                          'source_name': 'FireEye Southeast Asia Threat '
                                         'Landscape March 2015',
                          'url': 'https://web.archive.org/web/20220122121143/https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-southeast-asia-threat-landscape.pdf'},
                         {'description': 'Mandiant. (n.d.). Advanced '
                                         'Persistent Threats (APTs). Retrieved '
                                         'February 14, 2024.',
                          'source_name': 'Mandiant Advanced Persistent Threats',
                          'url': 'https://www.mandiant.com/resources/insights/apt-groups'},
                         {'description': 'Microsoft . (2023, July 12). How '
                                         'Microsoft names threat actors. '
                                         'Retrieved November 17, 2023.',
                          'source_name': 'Microsoft Threat Actor Naming July '
                                         '2023',
                          'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'},
                         {'description': 'Microsoft Threat Intelligence. '
                                         '(2023, September). Digital threats '
                                         'from East Asia increase in breadth '
                                         'and effectiveness. Retrieved '
                                         'February 5, 2024.',
                          'source_name': 'Microsoft East Asia Threats '
                                         'September 2023',
                          'url': 'https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW1aFyW'},
                         {'description': 'National Security Agency. (2022, '
                                         'December). APT5: Citrix ADC Threat '
                                         'Hunting Guidance. Retrieved February '
                                         '5, 2024.',
                          'source_name': 'NSA APT5 Citrix Threat Hunting '
                                         'December 2022',
                          'url': 'https://media.defense.gov/2022/Dec/13/2003131586/-1/-1/0/CSA-APT5-CITRIXADC-V1.PDF'},
                         {'description': 'Perez, D. et al. (2021, April 20). '
                                         'Check Your Pulse: Suspected APT '
                                         'Actors Leverage Authentication '
                                         'Bypass Techniques and Pulse Secure '
                                         'Zero-Day. Retrieved February 5, '
                                         '2024.',
                          'source_name': 'Mandiant Pulse Secure Zero-Day April '
                                         '2021',
                          'url': 'https://www.mandiant.com/resources/blog/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day'},
                         {'description': 'Perez, D. et al. (2021, May 27). '
                                         'Re-Checking Your Pulse: Updates on '
                                         'Chinese APT Actors Compromising '
                                         'Pulse Secure VPN Devices. Retrieved '
                                         'February 5, 2024.',
                          'source_name': 'Mandiant Pulse Secure Update May '
                                         '2021',
                          'url': 'https://www.mandiant.com/resources/blog/updates-on-chinese-apt-compromising-pulse-secure-vpn-devices'},
                         {'description': 'Secureworks CTU. (n.d.). BRONZE '
                                         'FLEETWOOD. Retrieved February 5, '
                                         '2024.',
                          'source_name': 'Secureworks BRONZE FLEETWOOD Profile',
                          'url': 'https://www.secureworks.com/research/threat-profiles/bronze-fleetwood'}],
 'id': 'intrusion-set--c1aab4c9-4c34-4f4f-8541-d529e46a07f9',
 'modified': '2025-04-04T17:08:23.100Z',
 'name': 'APT5',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'intrusion-set',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['@_montysecurity'],
 'x_mitre_deprecated': False,
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_version': '1.1'}
Quick Actions
Related TTPs (29)
Keylogging
Collection

Local Data Staging
Collection

Archive via Utility
Collection

LSASS Memory
Credential Access

Security Account Manager
Credential Access