Putter Panda were the subject of an extensive report by CrowdStrike, which stated: 'The CrowdStrike Intelligence team has been tracking this particular unit since2012, under the codename PUTTER PANDA, and has documented activity dating back to 2007. The report identifies Chen Ping, aka cpyy, and the primary location of Unit 61486.'
There are currently no families associated with this actor.
|2022-08-04 ⋅ Mandiant ⋅ |
Advanced Persistent Threats (APTs)
APT1 APT10 APT12 APT14 APT15 APT16 APT17 APT18 APT19 APT2 APT20 APT21 APT22 APT23 APT24 APT27 APT3 APT30 APT31 APT4 APT40 APT5 APT9 Naikon
|2019-11-19 ⋅ FireEye ⋅ |
Achievement Unlocked: Chinese Cyber Espionage Evolves to Support Higher Level Missions
APT1 APT10 APT2 APT26 APT3 APT30 APT41 Naikon Tonto Team
|2019 ⋅ Council on Foreign Relations ⋅ |
|2017-05-31 ⋅ MITRE ⋅ |
4h_rat pngdowner APT2
|2014-06-09 ⋅ CrowdStrike ⋅ |
CrowdStrike Intelligence Report: Putter Panda