Chinese Malicious Cyber Activity

The information contained on this page is the result of analytic efforts of the Cybersecurity and Infrastructure Security Agency (CISA) to provide technical details on the tactics, techniques, and procedures used by People’s Republic of China (PRC) cyber threat actors.

Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

On September 14, 2020, CISA and the Federal Bureau of Investigation (FBI) issued an advisory about Chinese Ministry of State Security (MSS)-affiliated cyber threat actors targeting U.S. government agencies. CISA has consistently observed Chinese MSS-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to target U.S. Government agencies. This advisory identifies some of the more common TTPs employed by cyber threat actors, including those affiliated with the Chinese MSS.  

Chinese Malware Variants

On August 3, 2020, CISA, the FBI, and the Department of Defense (DoD) released Malware Analysis Report MAR-10292089-1.v1, which states that Chinese government actors are using malware variants in conjunction with proxy servers to maintain a presence on victim networks and to further network exploitation. CISA, FBI, and DoD are distributed this MAR to enable network defense and reduce exposure to Chinese government malicious cyber activity:

PRC Targeting of COVID-19 Research Organizations

On May 13, 2020, CISA and the FBI issued a Public Service Announcement warning organizations researching COVID-19 of likely targeting and attempted network compromise by the People’s Republic of China (PRC). Healthcare, pharmaceutical, and research sectors working on the COVID-19 response should all be aware they are the prime targets of this activity and take the necessary steps to protect their systems.

China’s efforts to target these sectors pose a significant threat to our nation’s response to COVID-19. This announcement is intended to raise awareness for research institutions and the American public and provide resources and guidance for those who may be targeted.

The FBI requests organizations who suspect suspicious activity to contact their local FBI field office. CISA is asking for all organizations supporting the COVID-19 response to partner with the agency in order to help protect these critical response efforts. CISA requests organizations to report incidents via the CISA Incident Reporting System.

Information for IT Service Providers and their Customers

Chinese government cyber threat actors are actively exploiting trust relationships between information technology (IT) service providers—such as managed service providers and cloud service providers—and their customers. The intent of sharing this information is to enable network defenders to identify and reduce exposure to Chinese malicious cyber activity. However, mitigation for this activity can be complex and there is no single solution that will fully alleviate all aspects of the threat actor activity.

At this time, all known victims of this activity have been notified by CISA and/or the Federal Bureau of Investigation (FBI). However, because there may be additional victims not yet identified, CISA recommends all IT service providers and their customers follow the recommendations, tools, and actions described in this page and in Alerts TA17-117A and TA18-276A, referenced below. Organizations and individuals that determine their risk to be elevated—either because they are in one of the targeted sectors, or because unusual activity is detected—should conduct a dedicated investigation to identify if any of this malicious activity is in their networks.

For more information on Chinese malicious cyber activity, see:

Guidance for IT Service Provider Customers

Guidance for IT Service Providers

  • Providers should fully implement the mitigation actions available on the APTs Targeting IT Service Provider Customers site page to protect against this malicious activity.
  • Providers should implement the following specific actions:
    • Apply the principle of least privilege to their environment, which means customer data sets are separated logically, and access to client networks is not shared;
    • Implement robust network and host-based monitoring solutions that looks for known malicious activity and anomalous behavior on the infrastructure and systems providing client services;
    • Ensure that log information is aggregated and correlated to enable maximum detection capabilities, with a focus on monitoring for account misuse; and
    • Work with their customers to ensure hosted infrastructure is monitored and maintained, either by the service provider or the client.
  • Providers may consult the following private industry report:
    • Operation Cloud Hopper - CISA does not endorse any commercial products or services identified in this report. Any hyperlinked websites do not constitute endorsement by CISA of the website or the information, products, or services contained therein.

Additional DHS Partner Resources