SYMBOLCOMMON_NAMEaka. SYNONYMS

APT2  (Back to overview)

aka: 4HCrew, G0024, MSUpdater, PLA Unit 61486, PUTTER PANDA, SULPHUR, SearchFire, TG-6952

Putter Panda were the subject of an extensive report by CrowdStrike, which stated: 'The CrowdStrike Intelligence team has been tracking this particular unit since2012, under the codename PUTTER PANDA, and has documented activity dating back to 2007. The report identifies Chen Ping, aka cpyy, and the primary location of Unit 61486.'


Associated Families

There are currently no families associated with this actor.


References
2022-08-04MandiantMandiant
Advanced Persistent Threats (APTs)
APT1 APT10 APT12 APT14 APT15 APT16 APT17 APT18 APT19 APT2 APT20 APT21 APT22 APT23 APT24 APT27 APT3 APT30 APT31 APT4 APT40 APT5 APT9 Naikon
2019-11-19FireEyeKelli Vanderlee, Nalani Fraser
Achievement Unlocked: Chinese Cyber Espionage Evolves to Support Higher Level Missions
APT1 APT10 APT2 APT26 APT3 APT30 APT41 Naikon Tonto Team
2019-01-01Council on Foreign RelationsCyber Operations Tracker
Putter Panda
APT2
2017-05-31MITREMITRE ATT&CK
Putter Panda
4h_rat pngdowner APT2
2014-06-09CrowdStrikeCrowdstrike Global intelliGenCe team
CrowdStrike Intelligence Report: Putter Panda
APT2

Credits: MISP Project