APT5
MISPUnknown
CN
Unknown
[APT5](https://attack.mitre.org/groups/G1023) is a China-based espionage actor that has been active since at least 2007 primarily targeting the telecommunications, aerospace, and defense industries throughout the U.S., Europe, and Asia. [APT5](https://attack.mitre.org/groups/G1023) has displayed advanced tradecraft and significant interest in compromising networking devices and their underlying software including through the use of zero-day exploits.(Citation: NSA APT5 Citrix Threat Hunting December 2022)(Citation: Microsoft East Asia Threats September 2023)(Citation: Mandiant Pulse Secure Zero-Day April 2021)(Citation: Mandiant Pulse Secure Update May 2021)(Citation: FireEye Southeast Asia Threat Landscape March 2015)(Citation: Mandiant Advanced Persistent Threats)
Techniques Used (29)
| ID | ATT&CK | Tactics |
|---|---|---|
| T1003.001 | LSASS Memory | - |
| T1003.002 | Security Account Manager | - |
| T1021.001 | Remote Desktop Protocol | - |
| T1021.004 | SSH | - |
| T1036.005 | Match Legitimate Resource Name or Location | - |
| T1049 | System Network Connections Discovery | - |
| T1053.003 | Cron | - |
| T1055 | Process Injection | - |
| T1056.001 | Keylogging | - |
| T1057 | Process Discovery | - |
| T1059.001 | PowerShell | - |
| T1059.003 | Windows Command Shell | - |
| T1070 | Indicator Removal | - |
| T1070.003 | Clear Command History | - |
| T1070.004 | File Deletion | - |
Aliases (1138)
Related Malware (13)
Metadata
| ID: | 122 |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 04:00 |