SYMBOLCOMMON_NAMEaka. SYNONYMS

Anchor Panda  (Back to overview)

aka: APT14, APT 14, QAZTeam, ALUMINUM

PLA Navy Anchor Panda is an adversary that CrowdStrike has tracked extensively over the last year targeting both civilian and military maritime operations in the green/brown water regions primarily in the area of operations of the South Sea Fleet of the PLA Navy. In addition to maritime operations in this region, Anchor Panda also heavily targeted western companies in the US, Germany, Sweden, the UK, and Australia, and other countries involved in maritime satellite systems, aerospace companies, and defense contractors. Not surprisingly, embassies and diplomatic missions in the region, foreign intelligence services, and foreign governments with space programs were also targeted.


Associated Families

There are currently no families associated with this actor.


References
2019Council on Foreign RelationsCyber Operations Tracker
@online{tracker:2019:anchor:2d6d817, author = {Cyber Operations Tracker}, title = {{Anchor Panda}}, date = {2019}, organization = {Council on Foreign Relations}, url = {https://www.cfr.org/interactive/cyber-operations/anchor-panda}, language = {English}, urldate = {2019-12-20} } Anchor Panda
Anchor Panda
2013-03-22CrowdStrikeAdam Meyers
@online{meyers:20130322:who:2309c24, author = {Adam Meyers}, title = {{Who is Anchor Panda}}, date = {2013-03-22}, organization = {CrowdStrike}, url = {http://www.crowdstrike.com/blog/whois-anchor-panda/}, language = {English}, urldate = {2019-12-20} } Who is Anchor Panda
Anchor Panda

Credits: MISP Project