SYMBOLCOMMON_NAMEaka. SYNONYMS

APT2  (Back to overview)

aka: PLA Unit 61486, PUTTER PANDA, MSUpdater, 4HCrew, SULPHUR, SearchFire, TG-6952, G0024

Putter Panda were the subject of an extensive report by CrowdStrike, which stated: 'The CrowdStrike Intelligence team has been tracking this particular unit since2012, under the codename PUTTER PANDA, and has documented activity dating back to 2007. The report identifies Chen Ping, aka cpyy, and the primary location of Unit 61486.'


Associated Families

There are currently no families associated with this actor.


References
2022-08-04MandiantMandiant
@online{mandiant:20220804:advanced:afb8956, author = {Mandiant}, title = {{Advanced Persistent Threats (APTs)}}, date = {2022-08-04}, organization = {Mandiant}, url = {https://www.mandiant.com/resources/insights/apt-groups}, language = {English}, urldate = {2022-08-30} } Advanced Persistent Threats (APTs)
APT1 APT10 APT12 APT14 APT15 APT16 APT17 APT18 APT19 APT2 APT20 APT21 APT22 APT23 APT24 APT27 APT3 APT30 APT31 APT4 APT40 APT5 APT9 Naikon
2019-11-19FireEyeNalani Fraser, Kelli Vanderlee
@techreport{fraser:20191119:achievement:30aad54, author = {Nalani Fraser and Kelli Vanderlee}, title = {{Achievement Unlocked: Chinese Cyber Espionage Evolves to Support Higher Level Missions}}, date = {2019-11-19}, institution = {FireEye}, url = {https://www.fireeye.com/content/dam/fireeye-www/summit/cds-2019/presentations/cds19-executive-s08-achievement-unlocked.pdf}, language = {English}, urldate = {2022-09-12} } Achievement Unlocked: Chinese Cyber Espionage Evolves to Support Higher Level Missions
APT1 APT10 APT2 APT26 APT3 APT30 APT41 Naikon Tonto Team
2019Council on Foreign RelationsCyber Operations Tracker
@online{tracker:2019:putter:23a3998, author = {Cyber Operations Tracker}, title = {{Putter Panda}}, date = {2019}, organization = {Council on Foreign Relations}, url = {https://www.cfr.org/interactive/cyber-operations/putter-panda}, language = {English}, urldate = {2019-12-20} } Putter Panda
APT2
2017-05-31MITREMITRE ATT&CK
@online{attck:20170531:putter:f56a7fd, author = {MITRE ATT&CK}, title = {{Putter Panda}}, date = {2017-05-31}, organization = {MITRE}, url = {https://attack.mitre.org/groups/G0024}, language = {English}, urldate = {2022-08-30} } Putter Panda
4h_rat pngdowner APT2
2014-06-09CrowdStrikeCrowdstrike Global intelliGenCe team
@techreport{team:20140609:crowdstrike:21f5399, author = {Crowdstrike Global intelliGenCe team}, title = {{CrowdStrike Intelligence Report: Putter Panda}}, date = {2014-06-09}, institution = {CrowdStrike}, url = {http://cdn0.vox-cdn.com/assets/4589853/crowdstrike-intelligence-report-putter-panda.original.pdf}, language = {English}, urldate = {2020-01-09} } CrowdStrike Intelligence Report: Putter Panda
APT2

Credits: MISP Project