top of page

Threat Actor Profile - APT22


Threat Actor: APT22; AKA "Barista"


Date of Activity: ~2014 - Present


Area of Operations: APT22 is believed to be based in China and primarily targets organizations and individuals in the United States, Europe, and Southeast Asia.


Overview: APT22 has a nexus to the Chinese government and has been operational since at least early 2014, carrying out intrusions and attack activity against public and private sector entities, including dissidents.


APT22 threat actors have used strategic web compromises in order to passively exploit targets of interest. APT22 actors have also identified vulnerable public-facing web servers on victim networks and uploaded webshells to gain access to the victim network. This is in addition to highly targeted and sophisticated spear phishing campaigns. Upon a successful click a victim will be implanted with malware to collect data, enable further access, and download/upload files for follow on operations. It is assessed to be associated with the PLA.


The group has on numerous occasions targeted biomedical, pharmaceutical, and healthcare organizations, including an attack on a cancer research institution.


TTPs:

• Nation-state tool set; to include implants, exploits, and RATs

• Intelligence collection against militaries and governments

• Implementing encrypted communications

• Long-term access to networks with deep access

• Robust Spear Phishing campaigns


Associated Malware: PISCES, SOGU, FLATNOTE, ANGRYBELL, BASELESS, SEAWOLF, LOGJAM

5 views0 comments

Recent Posts

The Latest

Get the daily newsletter that intelligence professionals rely on to stay informed.

Want Even More Content?