APT3 (BORON): A Pioneering China-Aligned Cyber Espionage Group

APT3 (BORON): A Pioneering China-Aligned Cyber Espionage Group

Introduction

The APT3 cyber threat group is one of the earliest groups of today’s Advanced Persistent Threat Groups and was instrumental in shaping the tactics, techniques, and operational model of many China-aligned cyber threat groups. For more than a decade APT3 has continued to evolve as an organization, albeit with varied levels of activity over time. In addition to providing a baseline to evaluate the relationship between state intelligence needs and private sector capabilities, APT3 serves as an example of what to expect from similar groups in the future. There are many other terms used to refer to APT3, including, but not limited to, BRONZE MAYFAIR, GOTHIC PANDA, BORON, Boyusec, Brocade Typhoon, Buckeye, TG-0110 and UPS. These multiple terms are the result of different cybersecurity vendors and intelligence agencies conducting research on common activity clusters of APT3.

APT3 BORON APT group profile card showing attribution, activity timeline, and risk level
APT3 (BORON) APT Group Profile – Brandefense Intelligence

Identity and Attribution

APT3 (Aptitude Threat Infiltration Group 3), formerly known as Boyusec, is considered to be a part of the Chinese Cyber Espionage Program (CCEP), which has been established since around 2010-11 by China’s State Council and Ministry of State Security, and they have an ongoing association. The relationship between APT3 and Boyusec has provided a unique view on how they collaborate for cyber operations with private companies, plus the fact that APT3 is the only known APT group to have been established in partnership with a commercial cybersecurity organisation (Boyusec.) Both public and corporate intelligence demonstrate that APT3 supports several long-term APT3 objectives.

Strategic Motivation

The main purpose for APT3 has always been to obtain sensitive information through cyber espionage, as opposed to generating revenue through online services. APT3 focuses primarily on obtaining Defensive Technology, Advanced Manufacturing and Critical Infrastructure information, giving them sustained access to high-value networks. The majority of APT3 targeted companies provided or facilitated innovation and policy development; as a result, through these companies, APT3 is able to collect valuable economic and strategic information.

Tactics, Techniques, and Procedures (TTPs)

APT3 use sophisticated tactics that advanced for their time, used more innovative than other actors did at that time.

Initial Access

APT3 had a variety of methods used for gaining access, using social engineering techniques through email and exploiting weaknesses in public-facing servers. They were able to weaponize new vulnerabilities very quickly after they were disclosed (in some cases, before a vendor had released patches to a weakness).

In several of their campaigns, they took advantage of watering hole attacks. They compromised the website of an organization with which they were associated and then used those sites to distribute malware selectively to their targets.

Exploitation and Execution

APT3 is known for developing and using custom exploit frameworks. The exploit framework was developed and maintained by APT3 and provided them with the capability to perform exploits against different versions of commonly used enterprise software. Using these exploitation frameworks, a user could execute payloads, escalate privileges, bypass security controls, and operate reliably.

APT3’s malware loader was a modular malware loader that allowed an operator to execute specific payloads based on the targeted victim environment and based on the intelligence requirements.

Persistence and Lateral Movement

After gaining access into a network, APT3 leveraged alternative methods of gaining repetitive access through the creation of scheduled tasks, install of services, and modification of registry entries. APT3 was adept at exploiting the inner workings of Windows and had a strong knowledge of enterprise networking environments and how they operate; thus allowing them to easily move from one workstation/system within a network to another.

Stealing credentials, utilizing pass-the-hash techniques, and using administrative tools to escalate privileges, were widely used. All of these methods allowed an APT3 operator to gain wider access with minimal effort through less visible and detectable means.

Command and Control

APT3 made extensive use of flexible C2 structures that combined standard web traffic and malicious web traffic through the use of the common HTTP/HTTPS protocols. Domains were created to look like legitimate domains, and the entire infrastructure was continuously changing in order to minimize the chance of detection or identification.

Early in their operations, APT3 conducted numerous early trials using proxy networks and chain-of-multi-hop C2 communication, all of which increased the complexity of defensive operations.

Malware and Tooling

APT3 has a record of multiple types of well-known malware and tool sets that have had an impact on the subsequent China-linked attacks. These tools included custom built backdoors, exploit kits and utilities for stealing user credentials.

One thing that APT3 toolsets has been noted for was their ‘industrial strength’ design – they were built for use in larger enterprise environments (‘multiple environments’). This meant APT3 focused on larger, complex entities (such as defence contractors and industrial companies).

The sophistication of APT3’s tool environment placed APT3 among the most capable APT actors of its day, particularly during its peak years 2012 to 2016.

Get your security score with Threat.watch
Threat.watch encouraging users to check their security score

Target Profile

APT3’s target set is extensive yet consistent with their broader strategy.

Primary Targets

  • U.S. and Euro defense contractors, U.S. and Euro military researchers
  • Firms that develop and manufacture aerospace components and advanced manufacturing equipment
  • Telecoms and tech firms that manufacture infrastructure
  • Government and policy agencies

Geographic Focus

APT3 operated on multiple continents, including: U.S., Eur, and E. Asia

The group’s targeting patterns indicate a significant focus on gathering technology and intelligence with long-term benefits.

Notable Operations

APT3’s historical cyber espionage campaigns have been quite extensive and covered:

  • 2012–2014: Consisting of the initial campaigns that focused on defense contractors in the U.S. and Europe and included custom exploit toolkits and backdoors.
  • 2015–2016: Which represented the peak of their activity with rapid exploitation of enterprise vulnerabilities leading to significant IP theft.
  • 2017: Where public disclosure and indictments caused a disruption in their activity and showed a downward trend thereafter.
  • Post-2018: Reduced visibility but suspected continued low-level or restructured activity within broader China-nexus ecosystems.

These operations underscore APT3’s historical importance rather than current volume.

Evolution and Current Status

Over time, the operational model adopted by APT3 has changed, mostly due to public attribution and subsequent legal action. Most importantly, fewer analysts attribute APT3’s current operations to previous operations, which may suggest that APT3 personnel, tools, or methodologies were incorporated into other groups within the overall China cyber threat environment.

The legacy of APT3 continues today, particularly within newer cyber espionage actors, with APT3’s methods seen as influencing exploit development and enterprise-level intrusive operations developing.

Threat Assessment

Today, APT3 has been identified as a historically high-threat, yet still relatively low-risk operator. As a low-risk threat actor, many of APT3’s earlier campaigns are now no longer being actively operated, but rather, many organizations will have some level of historical exposure to APT3’s intrusion activity and therefore may continue to have some level of risk resulting from previously compromised systems or stolen intellectual property.

APT3’s activities illustrate that initial investments made to develop further exploit technologies, as well as the discipline used to maintain the integrity of the exploit, can yield long-term operational advantages for an operator.

Defensive Takeaways

When defending against threats like APT3, defenders can incorporate several pieces of information from APT3’s defensive strategies:

  • The quickest way to avoid intrusion is through hastily made patches to enterprise systems, including software, applications, and services
  • Identifying abuse of legitimate processes and practices is critical
  • Often when an operator has been able to maintain an extended period of inactivity, the operator has used stealth as the weapon of choice rather than overt exploitation.

Understanding how APT3 operated is important for protection against the current threats from actors aligned with Chinese interests in espionage.

Conclusion

Cyber espionage history has APT3 as a unique entity. Several new standards created through APT3’s work serve as a blueprint for state/private sector partnership and many of the ideas currently utilized by Advanced Threat Actors today were developed by APT3.

Currently, APT3 does not exist in the capacity that it once did. However, many companies and agencies are developing their techniques based on APT3’s extensive work, which continues to impact the nature of modern cyber threateners. Cybersecurity defenders can learn about today’s high-end constant threats through examining APT3’s contributions to developing the techniques constituting today’s high-end constant threats.

Two cybersecurity professionals reviewing threat intelligence on a laptop in a secure operations center
Brandefense provides trusted threat intelligence and digital risk protection for global security teams.
Share This: