Threat Actor Profile
High APT
Description

Leviathan is a Chinese state-sponsored cyber espionage group that has been attributed to the Ministry of State Security's (MSS) Hainan State Security Department and an affiliated front company.(Citation: CISA AA21-200A APT40 July 2021) Active since at least 2009, Leviathan has targeted the following sectors: academia, aerospace/aviation, biomedical, defense industrial base, government, healthcare, manufacturing, maritime, and transportation across the US, Canada, Australia, Europe, the Middle East, and Southeast Asia.(Citation: CISA AA21-200A APT40 July 2021)(Citation: Proofpoint Leviathan Oct 2017)(Citation: FireEye Periscope March 2018)(Citation: CISA Leviathan 2024)

Confidence Score
90%
Known Aliases
Leviathan MUDCARP Kryptonite Panda Gadolinium BRONZE MOHAWK TEMP.Jumper APT40 TEMP.Periscope Gingham Typhoon
Tags
mitre-attack stix-2.1 intrusion-set
First Seen

Unknown

Last Updated

Unknown

Active Status
Active
Created

April 29, 2026

MITRE ATT&CK Techniques (50)
T1074.001 - Local Data Staging
Collection
T1074.002 - Remote Data Staging
Collection
T1560 - Archive Collected Data
Collection
T1090.003 - Multi-hop Proxy
Command and Control
T1102.003 - One-Way Communication
Command and Control
T1105 - Ingress Tool Transfer
Command and Control
T1572 - Protocol Tunneling
Command and Control
T1003 - OS Credential Dumping
Credential Access
T1003.001 - LSASS Memory
Credential Access
T1027.001 - Binary Padding
Defense Evasion
T1027.003 - Steganography
Defense Evasion
T1027.013 - Encrypted/Encoded File
Defense Evasion
T1027.015 - Compression
Defense Evasion
T1055.001 - Dynamic-link Library Injection
Defense Evasion
T1078 - Valid Accounts
Defense Evasion
T1140 - Deobfuscate/Decode Files or Information
Defense Evasion
T1197 - BITS Jobs
Defense Evasion
T1218.010 - Regsvr32
Defense Evasion
T1553.002 - Code Signing
Defense Evasion
T1047 - Windows Management Instrumentation
Execution
T1059.001 - PowerShell
Execution
T1059.005 - Visual Basic
Execution
T1203 - Exploitation for Client Execution
Execution
T1204.001 - Malicious Link
Execution
T1204.002 - Malicious File
Execution
T1559.002 - Dynamic Data Exchange
Execution
T1041 - Exfiltration Over C2 Channel
Exfiltration
T1567.002 - Exfiltration to Cloud Storage
Exfiltration
T1189 - Drive-by Compromise
Initial Access
T1190 - Exploit Public-Facing Application
Initial Access
T1566.001 - Spearphishing Attachment
Initial Access
T1566.002 - Spearphishing Link
Initial Access
T1021.001 - Remote Desktop Protocol
Lateral Movement
T1021.004 - SSH
Lateral Movement
T1534 - Internal Spearphishing
Lateral Movement
T1133 - External Remote Services
Persistence
T1505.003 - Web Shell
Persistence
T1547.001 - Registry Run Keys / Startup Folder
Persistence
T1547.009 - Shortcut Modification
Persistence
T1546.003 - Windows Management Instrumentation Even…
Privilege Escalation
T1589.001 - Credentials
Reconnaissance
T1595.002 - Vulnerability Scanning
Reconnaissance
T1583.001 - Domains
Resource Development
T1584.004 - Server
Resource Development
T1584.008 - Network Devices
Resource Development
T1585.001 - Social Media Accounts
Resource Development
T1585.002 - Email Accounts
Resource Development
T1586.001 - Social Media Accounts
Resource Development
T1586.002 - Email Accounts
Resource Development
T1587.004 - Exploits
Resource Development
Indicators of Compromise

Loading IOCs…

IOC KQL for Sentinel
STIX Data
{'aliases': ['Leviathan',
             'MUDCARP',
             'Kryptonite Panda',
             'Gadolinium',
             'BRONZE MOHAWK',
             'TEMP.Jumper',
             'APT40',
             'TEMP.Periscope',
             'Gingham Typhoon'],
 'created': '2018-04-18T17:59:24.739Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': '[Leviathan](https://attack.mitre.org/groups/G0065) is a '
                'Chinese state-sponsored cyber espionage group that has been '
                "attributed to the Ministry of State Security's (MSS) Hainan "
                'State Security Department and an affiliated front '
                'company.(Citation: CISA AA21-200A APT40 July 2021) Active '
                'since at least 2009, '
                '[Leviathan](https://attack.mitre.org/groups/G0065) has '
                'targeted the following sectors: academia, aerospace/aviation, '
                'biomedical, defense industrial base, government, healthcare, '
                'manufacturing, maritime, and transportation across the US, '
                'Canada, Australia, Europe, the Middle East, and Southeast '
                'Asia.(Citation: CISA AA21-200A APT40 July 2021)(Citation: '
                'Proofpoint Leviathan Oct 2017)(Citation: FireEye Periscope '
                'March 2018)(Citation: CISA Leviathan 2024)',
 'external_references': [{'external_id': 'G0065',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/groups/G0065'},
                         {'description': '(Citation: CISA AA21-200A APT40 July '
                                         '2021)(Citation: Accenture MUDCARP '
                                         'March 2019)',
                          'source_name': 'MUDCARP'},
                         {'description': '(Citation: CISA AA21-200A APT40 July '
                                         '2021)(Citation: Crowdstrike '
                                         'KRYPTONITE PANDA August 2018)',
                          'source_name': 'Kryptonite Panda'},
                         {'description': '(Citation: CISA AA21-200A APT40 July '
                                         '2021)(Citation: MSTIC GADOLINIUM '
                                         'September 2020)',
                          'source_name': 'Gadolinium'},
                         {'description': '(Citation: CISA AA21-200A APT40 July '
                                         '2021)(Citation: SecureWorks BRONZE '
                                         'MOHAWK n.d.)',
                          'source_name': 'BRONZE MOHAWK'},
                         {'description': '(Citation: Microsoft Threat Actor '
                                         'Naming July 2023)',
                          'source_name': 'Gingham Typhoon'},
                         {'description': '(Citation: Proofpoint Leviathan Oct '
                                         '2017)',
                          'source_name': 'Leviathan'},
                         {'description': '[Leviathan](https://attack.mitre.org/groups/G0065) '
                                         'was previously reported upon by '
                                         'FireEye as TEMP.Periscope and '
                                         'TEMP.Jumper.(Citation: CISA '
                                         'AA21-200A APT40 July 2021)(Citation: '
                                         'FireEye APT40 March 2019)',
                          'source_name': 'TEMP.Jumper'},
                         {'description': '[Leviathan](https://attack.mitre.org/groups/G0065) '
                                         'was previously reported upon by '
                                         'FireEye as TEMP.Periscope and '
                                         'TEMP.Jumper.(Citation: CISA '
                                         'AA21-200A APT40 July 2021)(Citation: '
                                         'FireEye Periscope March '
                                         '2018)(Citation: FireEye APT40 March '
                                         '2019)',
                          'source_name': 'TEMP.Periscope'},
                         {'description': 'Accenture iDefense Unit. (2019, '
                                         "March 5). Mudcarp's Focus on "
                                         'Submarine Technologies. Retrieved '
                                         'August 24, 2021.',
                          'source_name': 'Accenture MUDCARP March 2019',
                          'url': 'https://www.accenture.com/us-en/blogs/cyber-defense/mudcarps-focus-on-submarine-technologies'},
                         {'description': 'Adam Kozy. (2018, August 30). Two '
                                         'Birds, One Stone Panda. Retrieved '
                                         'August 24, 2021.',
                          'source_name': 'Crowdstrike KRYPTONITE PANDA August '
                                         '2018',
                          'url': 'https://www.crowdstrike.com/blog/two-birds-one-stone-panda/'},
                         {'description': 'Axel F, Pierre T. (2017, October '
                                         '16). Leviathan: Espionage actor '
                                         'spearphishes maritime and defense '
                                         'targets. Retrieved February 15, '
                                         '2018.',
                          'source_name': 'Proofpoint Leviathan Oct 2017',
                          'url': 'https://www.proofpoint.com/us/threat-insight/post/leviathan-espionage-actor-spearphishes-maritime-and-defense-targets'},
                         {'description': 'Ben Koehl, Joe Hannon. (2020, '
                                         'September 24). Microsoft Security - '
                                         'Detecting Empires in the Cloud. '
                                         'Retrieved August 24, 2021.',
                          'source_name': 'MSTIC GADOLINIUM September 2020',
                          'url': 'https://www.microsoft.com/security/blog/2020/09/24/gadolinium-detecting-empires-cloud/'},
                         {'description': 'CISA et al. (2024, July 8). People’s '
                                         'Republic of China (PRC) Ministry of '
                                         'State Security APT40 Tradecraft in '
                                         'Action. Retrieved February 3, 2025.',
                          'source_name': 'CISA Leviathan 2024',
                          'url': 'https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-190a'},
                         {'description': 'CISA. (2021, July 19). (AA21-200A) '
                                         'Joint Cybersecurity Advisory – '
                                         'Tactics, Techniques, and Procedures '
                                         'of Indicted APT40 Actors Associated '
                                         'with China’s MSS Hainan State '
                                         'Security Department. Retrieved '
                                         'August 12, 2021.',
                          'source_name': 'CISA AA21-200A APT40 July 2021',
                          'url': 'https://us-cert.cisa.gov/ncas/alerts/aa21-200a'},
                         {'description': 'FireEye reporting on TEMP.Periscope '
                                         '(which was combined into APT40) '
                                         'indicated TEMP.Periscope was '
                                         'reported upon as '
                                         'Leviathan.(Citation: CISA AA21-200A '
                                         'APT40 July 2021)(Citation: '
                                         'Proofpoint Leviathan Oct '
                                         '2017)(Citation: FireEye Periscope '
                                         'March 2018)(Citation: FireEye APT40 '
                                         'March 2019)',
                          'source_name': 'APT40'},
                         {'description': 'FireEye. (2018, March 16). Suspected '
                                         'Chinese Cyber Espionage Group '
                                         '(TEMP.Periscope) Targeting U.S. '
                                         'Engineering and Maritime Industries. '
                                         'Retrieved April 11, 2018.',
                          'source_name': 'FireEye Periscope March 2018',
                          'url': 'https://www.fireeye.com/blog/threat-research/2018/03/suspected-chinese-espionage-group-targeting-maritime-and-engineering-industries.html'},
                         {'description': 'Microsoft . (2023, July 12). How '
                                         'Microsoft names threat actors. '
                                         'Retrieved November 17, 2023.',
                          'source_name': 'Microsoft Threat Actor Naming July '
                                         '2023',
                          'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'},
                         {'description': 'Plan, F., et al. (2019, March 4). '
                                         'APT40: Examining a China-Nexus '
                                         'Espionage Actor. Retrieved March 18, '
                                         '2019.',
                          'source_name': 'FireEye APT40 March 2019',
                          'url': 'https://www.fireeye.com/blog/threat-research/2019/03/apt40-examining-a-china-nexus-espionage-actor.html'},
                         {'description': 'SecureWorks. (n.d.). Threat Profile '
                                         '- BRONZE MOHAWK. Retrieved August '
                                         '24, 2021.',
                          'source_name': 'SecureWorks BRONZE MOHAWK n.d.',
                          'url': 'https://www.secureworks.com/research/threat-profiles/bronze-mohawk'}],
 'id': 'intrusion-set--7113eaa5-ba79-4fb3-b68a-398ee9cd698e',
 'modified': '2025-02-03T21:55:54.314Z',
 'name': 'Leviathan',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'intrusion-set',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Valerii Marchuk, Cybersecurity Help s.r.o.'],
 'x_mitre_deprecated': False,
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_version': '4.1'}
Quick Actions
Related TTPs (50)
Local Data Staging
Collection

Remote Data Staging
Collection

Archive Collected Data
Collection

Multi-hop Proxy
Command and Control

One-Way Communication
Command and Control