12:00am, 9 July 2024
TLP Rating:
PRC MSS tradecraft in action
The National Cyber Security Centre (NCSC) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and other international partners to release an advisory outlining a People’s Republic of China (PRC) state-sponsored cyber group, APT40, and the current threat it poses to Australian networks.
Authoring agencies include the:
- ASD’s ACSC,
- United States Cybersecurity and Infrastructure Security Agency (CISA),
- United States National Security Agency (NSA),
- United States Federal Bureau of Investigation (FBI),
- United Kingdom National Cyber Security Centre (NCSC-UK),
- Canadian Centre for Cyber Security (CCCS),
- German Federal Intelligence Service (BND),
- Federal Office for the Protection of the Constitution (BfV),
- Korean National Intelligence Service (NIS),
- Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC), and
- National Police Agency (NPA).
The advisory draws on the authoring agencies’ shared understanding of the threat and ASD’s ACSC incident response investigations.
What's happening
Systems affected
APT40 is conducting regular reconnaissance against networks of interest in Australia, looking for opportunities to compromise its targets. The group uses compromised infrastructure, including small-office/home-office (SOHO) devices, as operational infrastructure to launch attacks that blend in with legitimate traffic and challenge network defenders.
This regular reconnaissance allows them to identify vulnerable, end-of-life, or unmaintained devices on networks of interest, and rapidly deploy exploits. APT40 continues to find success exploiting vulnerabilities where systems remain unpatched.
What this means
As New Zealand organisations often use similar technology and systems to those used in Australia, the NCSC is alerting local organisations to this type of activity so they can take steps to defend against it.
This is not the first time this cyber actor and similar activity have been flagged to New Zealand operators. In March, Minister Collins, the Minister responsible for the GCSB, publicly attributed malicious cyber activity affecting New Zealand Government agencies to this same cyber actor, APT40. The authoring agencies understand this actor is associated with the PRC Ministry of State Security (MSS).
What to look for
How to tell if you're at risk
The NCSC encourages organisations to review the scenarios outlined in the advisory’s case studies to understand how the actor employs their tools and tradecraft, and to take steps to defend against them.
What to do
Prevention
The NCSC encourages organisations to review the tradecraft outlined in the advisory and apply the detection and mitigation recommendations
More information
If you have any questions about this advisory, contact the NCSC by email: info@ncsc.govt.nz.
How helpful was this page?
This site is protected by reCAPTCHA and the Google Privacy Policy External Link and Terms of Service External Link apply.