No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

20-Year-Old Chinese APT15 Finds New Life in Foreign Ministry Attacks

June 21, 2023
in Protection
0
20-Year-Old Chinese APT15 Finds New Life in Foreign Ministry Attacks



From late 2022 to early 2023, a Chinese state-level threat actor used a novel malware to conduct espionage against foreign ministries in North and South America.

The group in question, APT15 (aka Flea, Nickel, Vixen Panda, KE3CHANG, Royal APT, and Playful Dragon) already “has a track record of honing in on government targets, diplomatic missions, and embassies, likely for intelligence-gathering purposes,” Symantec researchers explained in a June 21 blog post. In recent years it has targeted diplomatic organizations, government organizations, and NGOs.

This latest campaign primarily focused on ministries of foreign affairs, but also included a government finance department and a corporation. All the targets were based in the Americas, a region which “does appear to have become more of a focus for the group in recent times,” the researchers wrote.

To carry out their espionage, APT15 employed well over a dozen tools, malicious and otherwise. Among its arsenal: Mimikatz and two of its variants, four Web shells including AntSword and China Chopper, and CVE-2020-1472, a three-year-old but CVSS 10.0 “Critical” privilege escalation vulnerability in the Windows server process Netlogon.

The attackers’ only unique tool was Graphican, a new variant of its old Trojan backdoor used to run commands and download files from victim machines. “This backdoor has evolved some of its anti-detection mechanisms,” acknowledges Avishai Avivi, CISO at SafeBreach. “That said, the fact that threat actors often use the same techniques allows companies to test their defenses proactively.”

What Is Graphican?

Graphican is an iteration on APT15’s other Trojan backdoor, Ketrican, itself an evolution of their earlier model, BS2005.

Graphican mostly distinguishes itself by foregoing a typical, hardcoded command-and-control (C2) server. Instead, it uses Microsoft Graph — an API for Microsoft 365 services — to retrieve an encrypted server address from a OneDrive folder.

Once the connection is made and the machine compromised, however, Graphican possesses the same basic functionalities as its predecessor — creating an attacker-controlled command line on the victim machine, creating new processes and files, and downloading files. “The similarities in functionality between Graphican and the known Ketrican backdoor may indicate that the group is not very concerned about having activity attributed to it,” the researchers speculate.

Avivi sees it differently. “The reality is that APT groups are really looking for efficiency,” he says. “Suppose a tool is proven effective for launching attacks or opening backdoors. In that case, they’ll keep using it until it loses its efficacy or is stopped. R&D costs time and money for adversaries just like it does for companies.”

Who Is APT15?

According to Symantec, APT15 has been around for nearly two decades. The group has made its biggest waves in recent years, however, so much so that in 2021 Microsoft’s Digital Crimes Unit performed a coordinated seizure of its known infrastructure. Even that coordinated action from Microsoft wasn’t enough to stop APT15, which returned a year later with a spyware campaign targeting Uyghur populations en masse.

Organizations interested in hardening against APT15 may not want to start with infection vectors. The group has been known to use phishing emails, “but there have also been reports of it exploiting public-facing applications, as well as using VPNs, to gain initial access to victim networks,” Symantec explained.

On the other hand, the relative consistency in APT15’s malware can be of benefit to defenders.

“Adversaries will use proven techniques to accomplish their goals,” Avivi says, pointing to APT15’s rehashing of largely similar malicious backdoors. “That is one, among many reasons, why validating security controls against known patterns and cycles can help companies better defend against these threat actors.”

Editorial Team

Editorial Team

Related Posts

The Xteink X4 E-Reader Is Under $60 on Amazon for the Next Few Hours
Protection

The Xteink X4 E-Reader Is Under $60 on Amazon for the Next Few Hours

April 25, 2026
What 'Zone 2' Cardio Actually Means
Protection

What ‘Zone 2’ Cardio Actually Means

April 25, 2026
The Sony WH-CH720N Noise-Canceling Headphones Are Nearly Half Off
Protection

The Sony WH-CH720N Noise-Canceling Headphones Are Nearly Half Off

April 25, 2026
10 Hacks Every YouTube Music User Should Know
Protection

10 Hacks Every YouTube Music User Should Know

April 25, 2026
ChatGPT's Latest Update Makes It Harder Than Ever to Spot AI-Generated Images
Protection

ChatGPT’s Latest Update Makes It Harder Than Ever to Spot AI-Generated Images

April 24, 2026
The Xteink S4 Might Be the Pocket E-Reader of My Dreams
Protection

The Xteink S4 Might Be the Pocket E-Reader of My Dreams

April 24, 2026
Load More
Next Post
Nvidia Stock Is Going Down Today. This Firm Sees a Big Drop Ahead.

Nvidia Stock Is Going Down Today. This Firm Sees a Big Drop Ahead.

Popular News

  • Hainan was China’s shopping paradise. For Beijing that’s no longer enough.

    Hainan was China’s shopping paradise. For Beijing that’s no longer enough.

    0 shares
    Share 0 Tweet 0
  • BII eyes private capital to mobilise £15bn into developing countries

    0 shares
    Share 0 Tweet 0
  • Tron analysts predict next $0.30 rally, Unilabs crosses DOGE volume

    0 shares
    Share 0 Tweet 0
  • Crypto market hit by $415M liquidation wave amid US-Iran tensions

    0 shares
    Share 0 Tweet 0
  • Proskauer: Three risks to monitor in private credit

    0 shares
    Share 0 Tweet 0

Latest News

Bitcoin nears $78K with 4th straight weekly gain amid US-Iran ceasefire

Bitcoin nears $78K with 4th straight weekly gain amid US-Iran ceasefire

April 26, 2026
0

Bitcoin is closing in on its fourth consecutive green weekly candle, rising 5.64% this week to hit $78,000. The Polymarket...

Gunfire persists in Mali town as UN urges international response after attacks

Gunfire persists in Mali town as UN urges international response after attacks

April 26, 2026
0

Gunfire persists in Mali town as UN urges international response after attacks

Bitcoin

Bitcoin Reclaims Key MVRV Support At $73.7K — What Comes Next?

April 26, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure Bitcoin (BTC) has staged a notable recovery...

Trump’s security again faces scrutiny after press dinner shooting

Trump’s security again faces scrutiny after press dinner shooting

April 26, 2026
0

Trump’s security again faces scrutiny after press dinner shooting

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.