BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
Threat Actors/APT41
🇨🇳

APT41

Also known as: Double Dragon · Wicked Panda · Brass Typhoon · BARIUM · Winnti Group · Axiom · Blackfly · Earth Baku

nation-state
Nation
🇨🇳 China
Active Since
2012
Targets
HealthcareTechnologyTelecommunicationsGamingFinanceGovernmentEducationManufacturingMediaCryptocurrency
Known Tools
WinntiShadowPadPlugXCobalt StrikeDeadeyeLOWKEYHIGHNOONCROSSWALKChina ChopperSpeculoosDustPanDustTrapKEYPLUGAcunetixSQLMap
MITRE ATT&CK
T1190T1195.002T1566.001T1059.001T1059.003T1055.001T1574.002T1078T1071.001T1573.001T1486T1005T1041T1053.005T1505.003
References
MITRE ATT&CKDOJ Indictment (2020)Mandiant APT41 ReportCISA Alert AA23-144AHHS HC3 APT41 Brief

Background

APT41 is one of the most prolific and versatile threat actors attributed to the People's Republic of China. What distinguishes APT41 from other Chinese state-sponsored groups is its dual mandate: the group conducts state-directed espionage operations during business hours and then pivots to financially motivated cybercrime -- including ransomware deployment, cryptojacking, and virtual currency theft -- during off-hours. This dual nature earned it the moniker "Double Dragon" from researchers at Mandiant (formerly FireEye), who published the definitive public analysis of the group in 2019.

APT41's operations are attributed to Chinese nationals working from Chengdu, Sichuan Province. In September 2020, the U.S. Department of Justice unsealed indictments against five Chinese citizens and two Malaysian nationals connected to the group. The indicted individuals were linked to Chengdu 404 Network Technology, a company that served as a front for the group's operations. The indictments detailed over 100 victim organizations across the United States, Australia, Brazil, Chile, Hong Kong, India, Indonesia, Japan, Malaysia, Pakistan, Singapore, South Korea, Taiwan, Thailand, and Vietnam.

The group has been active since at least 2012, initially focusing on the video game industry before expanding to a vast range of sectors. APT41's espionage operations align with China's Five-Year Plans and strategic economic goals, targeting industries where China seeks to gain competitive advantage. The group's technical capabilities are among the highest observed, including the ability to compromise software supply chains and deploy sophisticated rootkits.

Notable Campaigns

Supply Chain Compromise of CCleaner (2017): APT41 compromised the build environment of Piriform's CCleaner, a widely used system utility with over 2 billion downloads. The group injected a backdoor into the legitimate software update, affecting approximately 2.27 million users. A second-stage payload was selectively deployed to systems at major technology and telecommunications companies, revealing the espionage objective behind the broad distribution.

ShadowPad Supply Chain Attack (2017): The group compromised NetSarang's server management software, embedding the ShadowPad backdoor into legitimate updates distributed to hundreds of organizations in the financial, energy, and pharmaceutical sectors. This represented one of the largest known software supply chain attacks at the time.

Global Intrusion Campaign Targeting Managed Service Providers (2019-2020): APT41 conducted a sweeping campaign exploiting vulnerabilities in Citrix NetScaler/ADC (CVE-2019-19781), Cisco routers, and Zoho ManageEngine (CVE-2020-10189). The group targeted at least 75 organizations across 20 countries in a matter of weeks, demonstrating their ability to rapidly operationalize new exploits at massive scale.

U.S. State Government Compromise (2021-2022): Mandiant reported that APT41 successfully compromised at least six U.S. state government networks by exploiting vulnerabilities in internet-facing web applications, including a zero-day in the USAHerds animal health tracking system (CVE-2021-44207) and the Log4Shell vulnerability (CVE-2021-44228). The group deployed KEYPLUG, a modular backdoor supporting multiple C2 protocols.

Gaming Industry Financial Crime (2012-2019): Throughout its history, APT41 targeted video game companies to steal in-game currency, manipulate virtual economies, and deploy ransomware. The group used its access to generate virtual currencies worth millions of dollars and, in at least one case, deployed ransomware against a gaming company -- an unusual combination of espionage and criminal activity from a single group.

Tactics, Techniques & Procedures

APT41's initial access methods are exceptionally diverse. The group has demonstrated expertise in supply chain compromises, exploitation of public-facing applications, spear-phishing with weaponized documents, and strategic web compromises (watering holes). They are among the fastest groups to weaponize newly disclosed vulnerabilities -- often within hours of public disclosure -- and maintain a library of exploits for common enterprise software.

Post-compromise, APT41 employs a layered persistence strategy. The group deploys web shells for immediate access, scheduled tasks for periodic execution, and rootkits (particularly the Winnti kernel-level rootkit) for deep, stealthy persistence. They frequently use DLL sideloading to execute their payloads through legitimate signed applications, and they have been observed modifying legitimate installed services to load malicious code.

For lateral movement, APT41 combines credential theft with exploitation. The group uses Mimikatz and custom credential harvesters to obtain passwords and Kerberos tickets, then moves through networks using RDP, SMB, and WMI. In larger environments, they specifically target domain controllers and configuration management systems to achieve widespread access rapidly.

APT41's command and control infrastructure is sophisticated, utilizing multiple protocols (HTTP/S, DNS, TCP, UDP) and frequently rotating domains and IP addresses. The group's KEYPLUG backdoor supports both WebSocket and DNS-based C2, allowing it to operate in heavily monitored environments. They also use legitimate cloud services (Google Drive, Microsoft OneDrive, Dropbox) as dead-drop resolvers and data exfiltration channels.

Data exfiltration varies by mission. For espionage operations, the group carefully stages and compresses data before exfiltrating over encrypted channels. For financial operations, they focus on direct monetization -- manipulating databases, stealing cryptocurrency wallet keys, or deploying ransomware.

Tools & Malware

  • Winnti -- The group's signature kernel-level backdoor and rootkit, used since at least 2013. Provides persistent, stealthy remote access with the ability to hide files, processes, and network connections. Multiple versions exist, including 64-bit variants with updated encryption.
  • ShadowPad -- A modular backdoor platform believed to be the successor to Winnti. Supports plugin-based functionality including keylogging, screen capture, file management, and credential theft. Has been shared with multiple Chinese APT groups.
  • KEYPLUG -- A modular backdoor written in C++ supporting multiple C2 protocols (TCP, HTTP, WebSocket, DNS, UDP). Deployed extensively in the 2021-2022 U.S. state government campaigns. A Linux variant (KEYPLUG.LINUX) also exists.
  • PlugX (Destroy RAT) -- A widely shared remote access trojan used by multiple Chinese threat groups. APT41 uses customized variants with DLL sideloading capabilities.
  • Cobalt Strike -- Commercial adversary simulation tool, used with custom loaders and malleable C2 profiles to evade detection.
  • Deadeye -- A downloader family unique to APT41, used to deploy LOWKEY and other payloads. Variants include DEADEYE.DOWN and DEADEYE.APPEND.
  • LOWKEY -- A passive backdoor that listens for incoming connections rather than beaconing out, making it harder to detect via network monitoring.
  • DustPan / DustTrap -- An in-memory dropper (DustPan) paired with a multi-channel backdoor (DustTrap) that can communicate via multiple protocols and decrypt its C2 configuration at runtime.
  • Acunetix / SQLMap -- Commercial and open-source web vulnerability scanning tools used during the reconnaissance and initial access phases.

Indicators & Detection

Supply Chain Vigilance: APT41's history of supply chain compromises demands rigorous software integrity verification. Implement code signing validation, monitor for unexpected changes in software build environments, and maintain an accurate software bill of materials (SBOM). Watch for legitimate software making unexpected network connections after updates.

Rapid Patching and Virtual Patching: Given APT41's speed at exploiting new vulnerabilities, organizations must implement aggressive patching timelines for internet-facing systems. Deploy web application firewalls (WAFs) and intrusion prevention systems with virtual patching capabilities to buy time when immediate patching is not feasible.

Rootkit Detection: Monitor for signs of the Winnti rootkit, including unexpected kernel drivers, hidden processes, and network connections not visible to standard tools. Use rootkit detection utilities and compare system state from both user-mode and kernel-mode perspectives.

DLL Sideloading Monitoring: APT41 heavily relies on DLL sideloading. Monitor for legitimate executables (particularly older versions of software like older VMware, Adobe, or Symantec binaries) loading DLLs from non-standard paths. Track DLL load events via Sysmon (Event ID 7) and flag anomalies.

Multi-Protocol C2 Detection: KEYPLUG and other APT41 tools use multiple C2 protocols. Monitor DNS for unusually long subdomain queries (DNS tunneling), WebSocket connections from unexpected processes, and encrypted traffic on non-standard ports. Implement JA3/JA3S fingerprinting to identify known APT41 tool signatures.

Financial Indicator Overlap: Due to APT41's dual espionage-criminal nature, traditional indicators of financially motivated crime (cryptomining processes, unauthorized cryptocurrency wallet access, ransomware precursor activity) may indicate APT41 activity and should not be dismissed as commodity threats without investigation.

Related Intelligence (1)

high

Multi-Platform RATs, AI-Driven Attacks, and Certificate Abuse: Weekly Vulnerability Roundup

Mar 4, 2026

All Threat Actors