In February 2013, Mandiant uncovered Advanced Persistent Threat 1 (APT1)—one of China's alleged cyber espionage groups—and provided a detailed report of APT1 operations. Mandiant's report included 3,000 indicators of the group's activity since 2006. It also analyzed unclassified data sets in an attempt to understand APT1's middle infrastructure: the system of hops, distribution points or relays, and the command and control (C2) servers that sit between APT1's victims and main C2 servers located overseas. To build that infrastructure, APT1 chose and exploited particular organizations to obfuscate communications while remaining in plain sight.
This new analysis from CERT, based on data from IP addresses known to be associated with APT1 and domain names provided by Mandiant, was conducted using a combination of System for Internet Level Knowledge (SiLK) tools, Microsoft Excel, and custom Python scripts. By combining key unclassified information, the authors successfully described a large, malicious network used to steal important information.
This study is aimed at the vast network of middle infrastructure—the pieces that sit between end targets and the home base—which comprises intermediary C2 servers, malware servers, and hop points used to push sensitive information along to APT1.
If you are a member of the media or analyst community and would like to schedule an interview with an SEI expert, please contact:
SEI Public Relations
Media Line: 412-268-4793
For other useful information sources, please visit the Contact Us page.