No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

20-Year-Old Chinese APT15 Finds New Life in Foreign Ministry Attacks

June 21, 2023
in Protection
0
20-Year-Old Chinese APT15 Finds New Life in Foreign Ministry Attacks



From late 2022 to early 2023, a Chinese state-level threat actor used a novel malware to conduct espionage against foreign ministries in North and South America.

The group in question, APT15 (aka Flea, Nickel, Vixen Panda, KE3CHANG, Royal APT, and Playful Dragon) already “has a track record of honing in on government targets, diplomatic missions, and embassies, likely for intelligence-gathering purposes,” Symantec researchers explained in a June 21 blog post. In recent years it has targeted diplomatic organizations, government organizations, and NGOs.

This latest campaign primarily focused on ministries of foreign affairs, but also included a government finance department and a corporation. All the targets were based in the Americas, a region which “does appear to have become more of a focus for the group in recent times,” the researchers wrote.

To carry out their espionage, APT15 employed well over a dozen tools, malicious and otherwise. Among its arsenal: Mimikatz and two of its variants, four Web shells including AntSword and China Chopper, and CVE-2020-1472, a three-year-old but CVSS 10.0 “Critical” privilege escalation vulnerability in the Windows server process Netlogon.

The attackers’ only unique tool was Graphican, a new variant of its old Trojan backdoor used to run commands and download files from victim machines. “This backdoor has evolved some of its anti-detection mechanisms,” acknowledges Avishai Avivi, CISO at SafeBreach. “That said, the fact that threat actors often use the same techniques allows companies to test their defenses proactively.”

What Is Graphican?

Graphican is an iteration on APT15’s other Trojan backdoor, Ketrican, itself an evolution of their earlier model, BS2005.

Graphican mostly distinguishes itself by foregoing a typical, hardcoded command-and-control (C2) server. Instead, it uses Microsoft Graph — an API for Microsoft 365 services — to retrieve an encrypted server address from a OneDrive folder.

Once the connection is made and the machine compromised, however, Graphican possesses the same basic functionalities as its predecessor — creating an attacker-controlled command line on the victim machine, creating new processes and files, and downloading files. “The similarities in functionality between Graphican and the known Ketrican backdoor may indicate that the group is not very concerned about having activity attributed to it,” the researchers speculate.

Avivi sees it differently. “The reality is that APT groups are really looking for efficiency,” he says. “Suppose a tool is proven effective for launching attacks or opening backdoors. In that case, they’ll keep using it until it loses its efficacy or is stopped. R&D costs time and money for adversaries just like it does for companies.”

Who Is APT15?

According to Symantec, APT15 has been around for nearly two decades. The group has made its biggest waves in recent years, however, so much so that in 2021 Microsoft’s Digital Crimes Unit performed a coordinated seizure of its known infrastructure. Even that coordinated action from Microsoft wasn’t enough to stop APT15, which returned a year later with a spyware campaign targeting Uyghur populations en masse.

Organizations interested in hardening against APT15 may not want to start with infection vectors. The group has been known to use phishing emails, “but there have also been reports of it exploiting public-facing applications, as well as using VPNs, to gain initial access to victim networks,” Symantec explained.

On the other hand, the relative consistency in APT15’s malware can be of benefit to defenders.

“Adversaries will use proven techniques to accomplish their goals,” Avivi says, pointing to APT15’s rehashing of largely similar malicious backdoors. “That is one, among many reasons, why validating security controls against known patterns and cycles can help companies better defend against these threat actors.”

Editorial Team

Editorial Team

Related Posts

The Best Books, Movies, Video Games, and Podcasts to Check Out After Watching ‘A Knight of the Seven Kingdoms'
Protection

The Best Books, Movies, Video Games, and Podcasts to Check Out After Watching ‘A Knight of the Seven Kingdoms’

April 22, 2026
How to Spot AI Audiobooks on Libby
Protection

How to Spot AI Audiobooks on Libby

April 21, 2026
The Best Last-Minute Deals From Home Depot's 'Spring Black Friday' Sale
Protection

The Best Last-Minute Deals From Home Depot’s ‘Spring Black Friday’ Sale

April 21, 2026
10 Hacks Every Apple CarPlay User Should Know
Protection

10 Hacks Every Apple CarPlay User Should Know

April 21, 2026
The Samsung Galaxy Watch Ultra Is Over $100 Off Right Now
Protection

The Samsung Galaxy Watch Ultra Is Over $100 Off Right Now

April 21, 2026
11 of the Biggest Moments in Tim Cook's Time As Apple CEO
Protection

11 of the Biggest Moments in Tim Cook’s Time As Apple CEO

April 21, 2026
Load More
Next Post
Nvidia Stock Is Going Down Today. This Firm Sees a Big Drop Ahead.

Nvidia Stock Is Going Down Today. This Firm Sees a Big Drop Ahead.

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • Chainalysis: Crypto Money Laundering Surged to $82 Billion in 2025

    0 shares
    Share 0 Tweet 0
  • Explainer-How the State of the Union became a stage for political confrontation

    0 shares
    Share 0 Tweet 0
  • Strait of Hormuz tensions keep WTI crude oil market on edge as April deadline nears

    0 shares
    Share 0 Tweet 0
  • Contrary To Popular Belief, This Is Not The Worst Bitcoin Crash In History – Here’s The List

    0 shares
    Share 0 Tweet 0

Latest News

DoorDash Stablecoin Payments Move Could Expand Mainstream Crypto Checkout

DoorDash Stablecoin Payments Move Could Expand Mainstream Crypto Checkout

April 22, 2026
0

DoorDash announced on April 21, 2026, that it is integrating stablecoin crypto payment infrastructure through Tempo – a layer-1 blockchain...

Stocks making the biggest moves after hours: ADBE, UAL, COF

Stocks making the biggest moves after hours: ADBE, UAL, COF

April 22, 2026
0

Check out the companies making headlines after the bell : United Airlines — Shares rose about 1% even after the...

Senior Associate Director, Executive MBA Career Advisor & Programming Lead

Senior Associate Director, Executive MBA Career Advisor & Programming Lead

April 22, 2026
0

Senior Associate Director, Executive MBA Career Advisor & Programming LeadUniversity OverviewThe University of Pennsylvania, the largest private employer in Philadelphia,...

Wendel and BNPP AM Alts Prime take stakes in Committed Advisors

Wendel and BNPP AM Alts Prime unit acquire stakes in Committed Advisors

April 22, 2026
0

Listed investment firm Wendel has completed its acquisition of a controlling stake in Committed Advisors, with BNP Paribas Asset Management...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.