Threat Actor Profile
Description
menuPass is a threat group that has been active since at least 2006. Individual members of menuPass are known to have acted in association with the Chinese Ministry of State Security's (MSS) Tianjin State Security Bureau and worked for the Huaying Haitai Science and Technology Development Company.(Citation: DOJ APT10 Dec 2018)(Citation: District Court of NY APT10 Indictment December 2018) menuPass has targeted healthcare, defense, aerospace, finance, maritime, biotechnology, energy, and government sectors globally, with an emphasis on Japanese organizations. In 2016 and 2017, the group is known to have targeted managed IT service providers (MSPs), manufacturing and mining companies, and a university.(Citation: Palo Alto menuPass Feb 2017)(Citation: Crowdstrike CrowdCast Oct 2013)(Citation: FireEye Poison Ivy)(Citation: PWC Cloud Hopper April 2017)(Citation: FireEye APT10 April 2017)(Citation: DOJ APT10 Dec 2018)(Citation: District Court of NY APT10 Indictment December 2018)
Confidence Score
Known Aliases
Tags
First Seen
Unknown
Last Updated
Unknown
Active Status
ActiveCreated
April 29, 2026
MITRE ATT&CK Techniques (46)
Indicators of Compromise
Loading IOCs…
IOC KQL for Sentinel
STIX Data
{'aliases': ['menuPass',
'Cicada',
'POTASSIUM',
'Stone Panda',
'APT10',
'Red Apollo',
'CVNX',
'HOGFISH',
'BRONZE RIVERSIDE'],
'created': '2017-05-31T21:32:09.054Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': '[menuPass](https://attack.mitre.org/groups/G0045) is a threat '
'group that has been active since at least 2006. Individual '
'members of [menuPass](https://attack.mitre.org/groups/G0045) '
'are known to have acted in association with the Chinese '
"Ministry of State Security's (MSS) Tianjin State Security "
'Bureau and worked for the Huaying Haitai Science and '
'Technology Development Company.(Citation: DOJ APT10 Dec '
'2018)(Citation: District Court of NY APT10 Indictment '
'December 2018)\n'
'\n'
'[menuPass](https://attack.mitre.org/groups/G0045) has '
'targeted healthcare, defense, aerospace, finance, maritime, '
'biotechnology, energy, and government sectors globally, with '
'an emphasis on Japanese organizations. In 2016 and 2017, the '
'group is known to have targeted managed IT service providers '
'(MSPs), manufacturing and mining companies, and a '
'university.(Citation: Palo Alto menuPass Feb 2017)(Citation: '
'Crowdstrike CrowdCast Oct 2013)(Citation: FireEye Poison '
'Ivy)(Citation: PWC Cloud Hopper April 2017)(Citation: FireEye '
'APT10 April 2017)(Citation: DOJ APT10 Dec 2018)(Citation: '
'District Court of NY APT10 Indictment December 2018)',
'external_references': [{'external_id': 'G0045',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/groups/G0045'},
{'description': '(Citation: Accenture Hogfish April '
'2018)',
'source_name': 'HOGFISH'},
{'description': '(Citation: DOJ APT10 Dec '
'2018)(Citation: District Court of NY '
'APT10 Indictment December 2018)',
'source_name': 'POTASSIUM'},
{'description': '(Citation: Palo Alto menuPass Feb '
'2017)(Citation: Accenture Hogfish '
'April 2018)(Citation: DOJ APT10 Dec '
'2018)(Citation: District Court of NY '
'APT10 Indictment December '
'2018)(Citation: Symantec Cicada '
'November 2020)',
'source_name': 'Stone Panda'},
{'description': '(Citation: Palo Alto menuPass Feb '
'2017)(Citation: Accenture Hogfish '
'April 2018)(Citation: FireEye APT10 '
'Sept 2018)(Citation: DOJ APT10 Dec '
'2018)(Citation: Symantec Cicada '
'November 2020)',
'source_name': 'APT10'},
{'description': '(Citation: Palo Alto menuPass Feb '
'2017)(Citation: DOJ APT10 Dec '
'2018)(Citation: District Court of NY '
'APT10 Indictment December 2018)',
'source_name': 'menuPass'},
{'description': '(Citation: PWC Cloud Hopper April '
'2017)(Citation: DOJ APT10 Dec '
'2018)(Citation: District Court of NY '
'APT10 Indictment December 2018)',
'source_name': 'Red Apollo'},
{'description': '(Citation: PWC Cloud Hopper April '
'2017)(Citation: DOJ APT10 Dec '
'2018)(Citation: District Court of NY '
'APT10 Indictment December 2018)',
'source_name': 'CVNX'},
{'description': '(Citation: SecureWorks BRONZE '
'STARLIGHT Ransomware Operations June '
'2022)',
'source_name': 'BRONZE RIVERSIDE'},
{'description': '(Citation: Symantec Cicada November '
'2020)',
'source_name': 'Cicada'},
{'description': 'Accenture Security. (2018, April '
'23). Hogfish Redleaves Campaign. '
'Retrieved July 2, 2018.',
'source_name': 'Accenture Hogfish April 2018',
'url': 'http://web.archive.org/web/20220810112638/https:/www.accenture.com/t20180423T055005Z_w_/se-en/_acnmedia/PDF-76/Accenture-Hogfish-Threat-Analysis.pdf'},
{'description': 'Counter Threat Unit Research Team . '
'(2022, June 23). BRONZE STARLIGHT '
'RANSOMWARE OPERATIONS USE HUI '
'LOADER. Retrieved December 7, 2023.',
'source_name': 'SecureWorks BRONZE STARLIGHT '
'Ransomware Operations June 2022',
'url': 'https://www.secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader'},
{'description': 'Crowdstrike. (2013, October 16). '
'CrowdCasts Monthly: You Have an '
'Adversary Problem. Retrieved '
'November 17, 2024.',
'source_name': 'Crowdstrike CrowdCast Oct 2013',
'url': 'https://www.slideshare.net/slideshow/crowd-casts-monthly-you-have-an-adversary-problem/27262315'},
{'description': 'FireEye iSIGHT Intelligence. (2017, '
'April 6). APT10 (MenuPass Group): '
'New Tools, Global Campaign Latest '
'Manifestation of Longstanding '
'Threat. Retrieved June 29, 2017.',
'source_name': 'FireEye APT10 April 2017',
'url': 'https://www.fireeye.com/blog/threat-research/2017/04/apt10_menupass_grou.html'},
{'description': 'FireEye. (2014). POISON IVY: '
'Assessing Damage and Extracting '
'Intelligence. Retrieved September '
'19, 2024.',
'source_name': 'FireEye Poison Ivy',
'url': 'https://www.mandiant.com/sites/default/files/2021-09/rpt-poison-ivy.pdf'},
{'description': 'Matsuda, A., Muhammad I. (2018, '
'September 13). APT10 Targeting '
'Japanese Corporations Using Updated '
'TTPs. Retrieved September 17, 2018.',
'source_name': 'FireEye APT10 Sept 2018',
'url': 'https://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.html'},
{'description': 'Miller-Osborn, J. and Grunzweig, J.. '
'(2017, February 16). menuPass '
'Returns with New Malware and New '
'Attacks Against Japanese Academics '
'and Organizations. Retrieved March '
'1, 2017.',
'source_name': 'Palo Alto menuPass Feb 2017',
'url': 'http://researchcenter.paloaltonetworks.com/2017/02/unit42-menupass-returns-new-malware-new-attacks-japanese-academics-organizations/'},
{'description': 'PwC and BAE Systems. (2017, April). '
'Operation Cloud Hopper. Retrieved '
'April 5, 2017.',
'source_name': 'PWC Cloud Hopper April 2017',
'url': 'https://web.archive.org/web/20220224041316/https:/www.pwc.co.uk/cyber-security/pdf/cloud-hopper-report-final-v4.pdf'},
{'description': 'Symantec. (2020, November 17). '
'Japan-Linked Organizations Targeted '
'in Long-Running and Sophisticated '
'Attack Campaign. Retrieved December '
'17, 2020.',
'source_name': 'Symantec Cicada November 2020',
'url': 'https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/cicada-apt10-japan-espionage'},
{'description': 'United States District Court '
'Southern District of New York (USDC '
'SDNY) . (2018, December 17). United '
'States of America v. Zhu Hua and '
'Zhang Shilong. Retrieved April 17, '
'2019.',
'source_name': 'DOJ APT10 Dec 2018',
'url': 'https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion'},
{'description': 'US District Court Southern District '
'of New York. (2018, December 17). '
'United States v. Zhu Hua Indictment. '
'Retrieved December 17, 2020.',
'source_name': 'District Court of NY APT10 '
'Indictment December 2018',
'url': 'https://www.justice.gov/opa/page/file/1122671/download'}],
'id': 'intrusion-set--222fbd21-fc4f-4b7e-9f85-0e6e3a76c33f',
'modified': '2024-11-17T23:19:12.450Z',
'name': 'menuPass',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': False,
'spec_version': '2.1',
'type': 'intrusion-set',
'x_mitre_attack_spec_version': '3.2.0',
'x_mitre_contributors': ['Edward Millington', 'Michael Cox'],
'x_mitre_deprecated': False,
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_version': '3.0'}