Zum Inhalt springen

APT Profil – APT3/Boyusec

Going for industrial secrets, going dark...?

About APT3/Boyusec

APT3 mainly focused on targets of strategic importance for the Chinese Communist Party, as well as
targets vital for China’s economic interests and military modernisation. The attacked entities included
targets in aerospace, defence, construction and engineering, telecommunications, and transportation.

The group’s political affiliation was mainly revealed in 2017 when various actors published attribution
statements that linked APT3 with the Chinese information security company Guangzhou Boyu Information
Technology Company, Ltd. (Boyusec), based in Guangzhou, which was acting as a front for the Chinese
Ministry of State Security (MSS). In 2014, Boyusec had established a joint active defence laboratory (ADUL) in cooperation with Guangdong ITSEC, a subordinate to the China Information Technology Evaluation Center
(CNITSEC) organisation, which is run by the MSS. CNITSEC is said to execute vulnerability testing and
reliability assessments of software for the Ministry. The vulnerabilities found by CNITSEC were then
allegedly used for intelligence operations by the MSS.

Associated APT designations

Country of origin

Period of activity


*According to threat intelligence company SecureWorks, the group started its activities in 2006.
According to the threat intelligence company Symantec, and in contrast to most of the other tracked Chinese APT groups (besides APT1), APT3 operations appeared to cease in mid-June 2017.

Mehr APT Profiles

  • Research and Analysis
APT Profil – APT 29

23 Februar 2023
Die technischen und inhaltlichen Merkmale der APT29 werden in diesem APT-Profil des EuRepoC-Teams analysiert.
Load More

End of Content.

Welcome to our Cyber Incident Dashboard!

For best results, please view on a desktop device.