APT1 China’s Cyber Espionage Group Attack Life Cycle with Reference to Mandiant Attack Cycle.

APT1: Attack Lifecycle

They begin with aggressive spear phishing.

1. The Initial Compromise

Methods intruders use to first penetrate a target organization’s network.

2. Establishing A Foothold

Actions that ensure control of the target network’s systems from outside the network.

Beachhead Backdoors

Simple tasks like retrieve files, gather basic system information and trigger the execution of other more significant capabilities backdoors.

Standard Backdoors

The backdoors which

3. Privilege Escalation

Escalating privileges involves acquiring items (most often usernames and passwords) that will allow access to more resources within the network.

4. Internal Reconnaissance

In the Internal Reconnaissance stage, the intruder collects information about the victim environment.

5. Lateral Movement

Once an APT intruder has a foothold inside the network and a set of legitimate credentials, it is simple for the intruder to move around the network undetected.

6. Maintain Presence

Intruder takes actions to ensure continued, long-term control over key systems in the network environment from outside of the network.

  1. APT1 using stolen usernames and passwords to log into victim networks’ VPNs
  2. APT1 intruders also attempt to log into web portals that the network offers like web pages shares internally.

7. Completing The Mission

APT1 finds files of interest they pack them into archive files before stealing them. APT intruders most commonly use the RAR archiving utility for this task, APT1 attackers will transfer files out of the network.

  1. MAPIGET, was designed specifically to steal email that has not yet been archived and still resides on a Microsoft Exchange Server.