ActiveNation-State
APT41
Double Dragon · BARIUM · Brass Typhoon +18 more
APT41, also known as Double Dragon, is a unique Chinese threat actor that conducts both state-sponsored espionage operations and financially motivated cybercrime. Active since at least 2012, the group is attributed to contractors working for China's Ministry of State Security (MSS), which provides them the unusual latitude to pursue personal financial gain alongside state-directed intelligence missions.
APT41 is technically sophisticated, known for deploying supply chain attacks (CCleaner 2017, ShadowPad in NetSarang 2017), targeting managed service providers, and exploiting zero-day vulnerabilities. The group has compromised software companies to inject backdoors into legitimate products, affecting millions of downstream users.
The group targets an exceptionally wide range of industries including healthcare, telecommunications, technology, gaming, higher education, media, manufacturing, retail, and government sectors across Asia, Europe, and North America. In 2020, the U.S. DOJ indicted five Chinese nationals associated with APT41's operations. Despite these indictments, APT41 has continued operations, exploiting zero-days in products from Citrix, Cisco, Zoho, Fortinet, and Barracuda.
Recent activity (2023-2024) includes campaigns exploiting CVE-2023-46747 (F5 BIG-IP), CVE-2024-23113 (Fortinet FortiOS), and CVE-2023-2868 (Barracuda ESG), demonstrating continued focus on edge devices and network appliances. APT41 has also been observed deploying ransomware for financial gain while simultaneously conducting espionage operations, maintaining their dual-mission profile.
China74 techniques28 tools