SYMBOLCOMMON_NAMEaka. SYNONYMS

APT14  (Back to overview)

aka: ANCHOR PANDA, QAZTeam, ALUMINUM

PLA Navy Anchor Panda is an adversary that CrowdStrike has tracked extensively over the last year targeting both civilian and military maritime operations in the green/brown water regions primarily in the area of operations of the South Sea Fleet of the PLA Navy. In addition to maritime operations in this region, Anchor Panda also heavily targeted western companies in the US, Germany, Sweden, the UK, and Australia, and other countries involved in maritime satellite systems, aerospace companies, and defense contractors. Not surprisingly, embassies and diplomatic missions in the region, foreign intelligence services, and foreign governments with space programs were also targeted.


Associated Families

There are currently no families associated with this actor.


References
2022-08-04MandiantMandiant
@online{mandiant:20220804:advanced:afb8956, author = {Mandiant}, title = {{Advanced Persistent Threats (APTs)}}, date = {2022-08-04}, organization = {Mandiant}, url = {https://www.mandiant.com/resources/insights/apt-groups}, language = {English}, urldate = {2022-08-30} } Advanced Persistent Threats (APTs)
APT1 APT10 APT12 APT14 APT15 APT16 APT17 APT18 APT19 APT2 APT20 APT21 APT22 APT23 APT24 APT27 APT3 APT30 APT31 APT4 APT40 APT5 APT9
2019Council on Foreign RelationsCyber Operations Tracker
@online{tracker:2019:anchor:2d6d817, author = {Cyber Operations Tracker}, title = {{Anchor Panda}}, date = {2019}, organization = {Council on Foreign Relations}, url = {https://www.cfr.org/interactive/cyber-operations/anchor-panda}, language = {English}, urldate = {2019-12-20} } Anchor Panda
APT14
2013-03-22CrowdStrikeAdam Meyers
@online{meyers:20130322:who:2309c24, author = {Adam Meyers}, title = {{Who is Anchor Panda}}, date = {2013-03-22}, organization = {CrowdStrike}, url = {http://www.crowdstrike.com/blog/whois-anchor-panda/}, language = {English}, urldate = {2019-12-20} } Who is Anchor Panda
APT14

Credits: MISP Project