Threat Actor Profile
High
APT
Description
Chimera is a suspected China-based threat group that has been active since at least 2018 targeting the semiconductor industry in Taiwan as well as data from the airline industry.(Citation: Cycraft Chimera April 2020)(Citation: NCC Group Chimera January 2021)
Confidence Score
Known Aliases
Chimera
Tags
mitre-attack
stix-2.1
intrusion-set
First Seen
Unknown
Last Updated
Unknown
Active Status
ActiveCreated
April 29, 2026
MITRE ATT&CK Techniques (59)
Indicators of Compromise
Loading IOCs…
IOC KQL for Sentinel
STIX Data
{'aliases': ['Chimera'],
'created': '2020-08-24T17:01:55.842Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': '[Chimera](https://attack.mitre.org/groups/G0114) is a '
'suspected China-based threat group that has been active since '
'at least 2018 targeting the semiconductor industry in Taiwan '
'as well as data from the airline industry.(Citation: Cycraft '
'Chimera April 2020)(Citation: NCC Group Chimera January 2021)',
'external_references': [{'external_id': 'G0114',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/groups/G0114'},
{'description': '(Citation: NCC Group Chimera January '
'2021) ',
'source_name': 'Chimera'},
{'description': 'Cycraft. (2020, April 15). APT Group '
'Chimera - APT Operation Skeleton key '
'Targets Taiwan Semiconductor '
'Vendors. Retrieved August 24, 2020..',
'source_name': 'Cycraft Chimera April 2020',
'url': 'https://cycraft.com/download/CyCraft-Whitepaper-Chimera_V4.1.pdf'},
{'description': 'Jansen, W . (2021, January 12). '
'Abusing cloud services to fly under '
'the radar. Retrieved September 12, '
'2024.',
'source_name': 'NCC Group Chimera January 2021',
'url': 'https://web.archive.org/web/20230218064220/https://research.nccgroup.com/2021/01/12/abusing-cloud-services-to-fly-under-the-radar/'}],
'id': 'intrusion-set--8c1f0187-0826-4320-bddc-5f326cfcfe2c',
'modified': '2024-09-12T19:24:40.416Z',
'name': 'Chimera',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': False,
'spec_version': '2.1',
'type': 'intrusion-set',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_deprecated': False,
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_version': '2.2'}