Threat Actor Profile

Turbine Panda

Turbine Panda, also known as APT26, is a state-sponsored Chinese threat actor affiliated with the Jiangsu Bureau of the Ministry of State Security (JSSD). First observed around 2010, this sophisticated group notably employs tactics like espionage and supply chain compromises. Their primary focus includes intellectual property theft and economic espionage targeting the aerospace, defense, and energy sectors.

Threat Actor Profile

Turbine Panda

Country of Origin

Turbine Panda is attributed to China. Numerous reports tie the group’s activities to the Jiangsu Bureau of the Ministry of State Security (MSS), emphasizing its state-backed origins.

Members

The exact number of individuals involved in Turbine Panda is unclear. Still, the group operates under several aliases, including Shell Crew, WebMasters, and KungFu Kittens, which highlights their diverse and adaptive operational methods.

Leadership

Specific leadership details about Turbine Panda remain unknown. However, their operations' scale and complexity suggest coordination within a structured intelligence apparatus like China’s MSS.

Turbine Panda TTPs

Tactics

The group primarily engages in intellectual property theft and espionage, targeting sensitive industries such as aerospace, defense, and critical infrastructure. They are notorious for compromising supply chains to infiltrate high-value targets.

Techniques

Turbine Panda employs strategic web compromises (watering-hole attacks), phishing, and the use of insiders to deliver malware, such as PlugX, Sakula, and the Winnti backdoor.

Procedures

Their operations often involve planting malware via compromised websites, phishing campaigns, or recruiting insiders to deploy malicious tools directly into target systems. They show a particular interest in infiltrating aerospace and defense supply chains, further enabling their espionage objectives

Want to Shut Down Threats Before They Start?

Notable Cyberattacks

Between 2010 and 2015, Turbine Panda carried out a widespread campaign to compromise aerospace firms involved in the supply chain for the C919 aircraft. These operations included supply chain intrusions, malware deployment, and the exfiltration of sensitive data. Additionally, they utilized malicious tools like PlugX and Sakula to infiltrate systems.

Law Enforcement & Arrests

To date, there have been limited public reports of arrests or direct law enforcement actions addressing Turbine Panda’s activities. Their state-sponsored status complicates accountability due to their ties to China’s MSS.

How to Defend Against Turbine Panda

1

Monitor for malware signatures like PlugX, Sakula, and Winnti using EDR solutions.

2

Strengthen web server security to detect watering-hole compromises or anomalous traffic patterns.

3

Secure supply chains by implementing network segmentation and vetting contractors and vendors.

4

Implement insider threat programs to detect unusual access or activity involving removable media.

5

Strengthen patch management to address vulnerabilities commonly exploited by the group.

6

Leverage threat intelligence sharing to identify IoCs and anticipate potential campaigns.




Detect, Respond, Protect

See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.

Try Huntress for Free