Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
APT10, also known as MenuPass, Red Apollo, or Stone Panda, is a highly sophisticated cyber espionage group believed to be linked to China’s Ministry of State Security (MSS). Active since at least 2009, APT10 leverages advanced malware, spear-phishing, and supply-chain compromises to target global industries. Their campaigns focus on stealing intellectual property and sensitive data, making them one of the most notorious espionage groups to date.
APT10’s primary motivation is cyber espionage, targeting intellectual property, trade secrets, and sensitive government data. Their strategies focus on stealth and persistence, ensuring prolonged access to victim environments for large-scale data theft.
APT10 uses spear-phishing emails with malicious attachments as a common entry point into networks. They compromise Managed Service Providers (MSPs) to indirectly access client networks—an approach heavily employed during the “Cloud Hopper” campaign. The group also exploits vulnerabilities in Virtual Private Networks (VPNs) and remote access tools to gain initial or secondary access.
Their custom malware arsenal includes tools such as RedLeaves RAT, Quasar RAT, and PlugX, in addition to credential harvesting tools like Mimikatz. Persistence is maintained through methods such as creating admin accounts, scheduled tasks, and DLL side-loading. They exfiltrate data using encrypted communication channels.
In December 2018, the U.S. Department of Justice indicted two Chinese nationals associated with APT10 for involvement in widespread hacking activities. The operation was publicly attributed to China’s MSS, with joint statements released by the UK, Japan, and other allies.
Detection Opportunities: Monitor for anomalies such as unusual RDP/VPN logins, suspicious scheduled tasks, and activity tied to APT10 malware. Pay attention to supply-chain access patterns.
Mitigations: Apply Multi-Factor Authentication (MFA) on all external access points, enforce least privilege for user accounts, and regularly patch remote access tools. Network segmentation and endpoint monitoring can also help reduce risk. Huntress tools provide proactive defense by identifying and mitigating APT10’s TTPs, ensuring fast response to emerging threats.