Attribution

This page is designed to be a one-stop resource for finding public attribution made by government organizations (or private sector) linking state-sponsored Advanced Persistent Threats to specific individuals, companies and entities. Some of these links were shamelessly stolen from Gabriel Currie, who runs their own APT Group Attribution page. If you can't find what you're looking for here, visit Gabriel's repo!

APTs with a large number of links might get a collapsed list.

Work in progress! Page updated January 17, 2025.

China

APT1 (PLA Unit 61398)

APT2 (PLA Unit 61486)

APT3 (Chinese National University of Defence and Technology, Guangzhou Bo Yu Information Technology Company Limited (Boyusec), MSS contractor)

APT10 (MSS Tianjin State Security Bureau)

APT17 (MSS Jinan State Security Bureau. Jinan Quanxin Technology, Jinan Anchuang Information Technology, Jinan Fanglang Information Technology, RealSOI)

APT26 (MSS Jiangsu State Security Department)

APT31 (MSS Hubei State Security Department)

APT40 (MSS Hainan State Security Department)

APT41 (Chengdu 404, MSS Contractor)

Flax Typhoon (IntegrityTech)

Salt Typhoon

Volt Typhoon

BlackTech

Hafnium (MSS)

RedFoxtrot (PLA Unit 69010)

Tick (PLA Unit 61419)

Tonto Team (3rd PLA, Shenyang TRB, Unit 65016/65017)

Iran

MuddyWater (MOIS)

APT39 (MOIS)

APT34/Oilrig (MOIS)

CyberAv3ngers (IRGC-CEC)

Cotton Sandstorm (Emennet Pasargad)

Charming Kitten (IRGC-IO)

North Korea

Lazarus (RGB)

Andariel (RGB 3rd Bureau)

BlueNoroff (RGB)

Kimsuky (RGB)

APT37 (MSS)

Scarcruft/Reaper

Russia

APT28 (GRU Unit 26165)

APT29 (SVR)

Callisto Group (FSB Center 18)

Ember Bear (GRU Unit 29155)

Sandworm (GRU Unit 74455)

Gamaredon (FSB Centers 16, 18)

Turla (FSB Center 16)

Berserk Bear (FSB)