search menu icon-carat-right cmu-wordmark

Investigating Advanced Persistent Threat 1 (APT1)

Technical Report
This report analyzes unclassified data sets in an attempt to understand APT1's middle infrastructure.
Publisher

Software Engineering Institute

CMU/SEI Report Number
CMU/SEI-2014-TR-001
DOI (Digital Object Identifier)
10.1184/R1/6574880.v1

Abstract

In February 2013, Mandiant uncovered Advanced Persistent Threat 1 (APT1)—one of China's alleged cyber espionage groups—and provided a detailed report of APT1 operations, along with 3,000 indicators of the group's activity since 2006. This report analyzes unclassified data sets in an attempt to understand APT1's middle infrastructure: the system of hops, distribution points or relays, and the command and control (C2) servers that sit between APT1's victims and main C2 servers located overseas. To build that infrastructure, APT1 chose and exploited particular organizations to obfuscate communications while remaining in plain sight.

This analysis, based on data from IP addresses known to be associated with APT1 and domain names provided by Mandiant, was conducted using a combination of System for Internet Level Knowledge (SiLK) tools, Microsoft Excel, and custom Python scripts. The study detailed in this report can be replicated easily using available sources and tools. By combining key unclassified information, the authors successfully described a large, malicious network used to steal important information.

Cite This Technical Report

Shick, D., & Horneman, A. (2014, May 12). Investigating Advanced Persistent Threat 1 (APT1). (Technical Report CMU/SEI-2014-TR-001). Retrieved April 24, 2024, from https://doi.org/10.1184/R1/6574880.v1.

@techreport{shick_2014,
author={Shick, Deana and Horneman, Angela},
title={Investigating Advanced Persistent Threat 1 (APT1)},
month={May},
year={2014},
number={CMU/SEI-2014-TR-001},
howpublished={Carnegie Mellon University, Software Engineering Institute's Digital Library},
url={https://doi.org/10.1184/R1/6574880.v1},
note={Accessed: 2024-Apr-24}
}

Shick, Deana, and Angela Horneman. "Investigating Advanced Persistent Threat 1 (APT1)." (CMU/SEI-2014-TR-001). Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, May 12, 2014. https://doi.org/10.1184/R1/6574880.v1.

D. Shick, and A. Horneman, "Investigating Advanced Persistent Threat 1 (APT1)," Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, Technical Report CMU/SEI-2014-TR-001, 12-May-2014 [Online]. Available: https://doi.org/10.1184/R1/6574880.v1. [Accessed: 24-Apr-2024].

Shick, Deana, and Angela Horneman. "Investigating Advanced Persistent Threat 1 (APT1)." (Technical Report CMU/SEI-2014-TR-001). Carnegie Mellon University, Software Engineering Institute's Digital Library, Software Engineering Institute, 12 May. 2014. https://doi.org/10.1184/R1/6574880.v1. Accessed 24 Apr. 2024.

Shick, Deana; & Horneman, Angela. Investigating Advanced Persistent Threat 1 (APT1). CMU/SEI-2014-TR-001. Software Engineering Institute. 2014. https://doi.org/10.1184/R1/6574880.v1