<<

National Cybersecurity & Federal Bureau Security Infrastructure of Investigation Cybersecurity Advisory Agency Security Agency

Chinese State-Sponsored Cyber Operations: Observed TTPs

Summary This advisory uses the MITRE The National Security Agency, Cybersecurity and Adversarial Tactics, Techniques Infrastructure Security Agency (CISA), and and Common Knowledge Federal Bureau of Investigation (FBI) assess that (ATT&CK®) framework, version 9, People’s Republic of China state-sponsored and MITRE D3FEND™ malicious cyber activity is a major threat to U.S. framework, version 0.9.2-BETA-3. and Allied cyberspace assets. Chinese state- See the ATT&CK for Enterprise sponsored cyber actors aggressively target U.S. framework for all referenced and allied political, economic, military, threat actor tactics and educational, and critical infrastructure (CI) techniques and the D3FEND personnel and organizations to steal sensitive framework for referenced data, critical and emerging key technologies, defensive tactics and techniques. intellectual property, and personally identifiable information (PII). Some target sectors include managed service providers, semiconductor companies, the Defense Industrial Base (DIB), universities, and medical institutions. These cyber operations support China’s long-term economic and military development objectives.

This Joint Cybersecurity Advisory (CSA) provides information on tactics, techniques, and procedures (TTPs) used by Chinese state-sponsored cyber actors. This advisory builds on previous NSA, CISA, and FBI reporting to inform federal, state, local, tribal, and territorial (SLTT) government, CI, DIB, and private industry organizations about notable trends and persistent TTPs through collaborative, proactive, and retrospective analysis.

To increase the defensive posture of their critical networks and reduce the risk of Chinese malicious cyber activity, NSA, CISA, and FBI urge government, CI, DIB, and private industry organizations to apply the recommendations listed in the Mitigations section of this advisory and in Appendix A: Chinese State-sponsored Cyber Actors' Observed Procedures. Note: NSA, CISA, and FBI encourage organization leaders to

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

review CISA Joint Insights: Chinese Malicious Cyber Activity: Threat Overview for Leaders for information on this threat to their organization.

Technical Details

Trends in Chinese State-Sponsored Cyber Operations NSA, CISA, and FBI have observed increasingly sophisticated Chinese state-sponsored cyber activity targeting U.S. political, economic, military, educational, and CI personnel and organizations. NSA, CISA, and FBI have identified the following trends in Chinese state-sponsored malicious cyber operations through proactive and retrospective analysis:

 Acquisition of Infrastructure and Capabilities. Chinese state-sponsored cyber actors remain agile and cognizant of the community’s practices. These actors take effort to mask their activities by using a revolving series of virtual private servers (VPSs) and common open-source or commercial penetration tools.  Exploitation of Public Vulnerabilities. Chinese state-sponsored cyber actors consistently scan target networks for critical and high vulnerabilities within days of the vulnerability’s public disclosure. In many cases, these cyber actors seek to exploit vulnerabilities in major applications, such as Pulse Secure, Apache, F5 Big-IP, and Microsoft products. For information on Common Vulnerabilities and Exposures (CVE) known to be exploited by malicious Chinese state-sponsored cyber actors, see: . CISA-FBI Joint CSA AA20-133A: Top 10 Routinely Exploited Vulnerabilities, . CISA Activity Alert: AA20-275A: Potential for China Cyber Response to Heightened U.S.-China Tensions, and . NSA CSA U/OO/179811-20: Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities  Encrypted Multi-Hop Proxies. Chinese state-sponsored cyber actors have been routinely observed using a VPS as an encrypted proxy. The cyber actors use the VPS as well as small office and home office (SOHO) devices as operational nodes to evade detection.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 2

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Observed Tactics and Techniques Chinese state-sponsored cyber actors use a full array of tactics and techniques to exploit computer networks of interest worldwide and to acquire sensitive intellectual property, economic, political, and military information. Appendix B: MITRE ATT&CK Framework lists the tactics and techniques used by Chinese state-sponsored cyber actors. A downloadable JSON file is also available on the NSA Cybersecurity GitHub page.

Refer to Appendix A: Chinese State-Sponsored Cyber Actors’ Observed Procedures for information on procedures affiliated with these tactics and techniques as well as applicable mitigations.

Figure 1: Example of tactics and techniques used in various cyber operations.

Mitigations NSA, CISA, and FBI urge federal and SLTT government, CI, DIB, and private industry organizations to apply the following recommendations as well as the detection and mitigation recommendations in Appendix A, which are tailored to observed tactics and techniques:

 Patch systems and equipment promptly and diligently. Focus on patching critical and high vulnerabilities that allow for remote code execution or denial-of- service on externally facing equipment and CVEs known to be exploited by

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 3

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Chinese state-sponsored cyber actors. Consider implementing a patch management program that enables a timely and thorough patching cycle. Note: for more information on CVEs routinely exploited by Chinese state- sponsored cyber actors refer to the resources listed in the Trends in Chinese State-Sponsored Cyber Operations section.  Enhance monitoring of network traffic, email, and endpoint systems. Review network signatures and indicators for focused activities, monitor for new themes, and adjust email rules accordingly. Follow the best practices of restricting attachments via email and blocking URLs and domains based upon reputation. Ensure that log information is aggregated and correlated to enable maximum detection capabilities, with a focus on monitoring for account misuse. Monitor common ports and protocols for command and control (C2) activity. SSL/TLS inspection can be used to see the contents of encrypted sessions to look for network-based indicators of communication protocols. Implement and enhance network and endpoint event analysis and detection capabilities to identify initial infections, compromised credentials, and the manipulation of endpoint processes and files.  Use protection capabilities to stop malicious activity. Implement anti-virus software and other endpoint protection capabilities to automatically detect and prevent malicious files from executing. Use a network intrusion detection and prevention system to identify and prevent commonly employed adversarial malware and limit nefarious data transfers. Use a domain reputation service to detect suspicious or malicious domains. Use strong credentials for service accounts and multi-factor (MFA) for remote access to mitigate an adversary's ability to leverage stolen credentials, but be aware of MFA interception techniques for some MFA implementations.▪

Resources Refer to us-cert.cisa.gov/china, https://www.ic3.gov/Home/IndustryAlerts, and https://www.nsa.gov/What- We-Do/Cybersecurity/Advisories-Technical-Guidance/ for previous reporting on Chinese state-sponsored malicious cyber activity.

Works Cited [1] FireEye (2020), This is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits. Available at: https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates- global-intrusion-campaign-using-multiple-exploits.html

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 4

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Disclaimer of Endorsement The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

Purpose This document was developed by NSA, CISA, and FBI in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see http://www.us-cert.gov/tlp/.

Trademark Recognition MITRE and ATT&CK are registered trademarks of The MITRE Corporation. • D3FEND is a trademark of The MITRE Corporation. • Microsoft, Microsoft Exchange, Office 365, Microsoft Office, OneDrive, Outlook, OWA, PowerShell, Windows Defender, and Windows are registered trademarks of Microsoft Corporation. • Pulse Secure is a registered trademark of Pulse Secure, LLC. • Apache is a registered trademark of Apache Software Foundation. • F5 and BIG- IP are registered trademarks of F5 Networks. • Cobalt Strike is a registered trademark of Strategic Cyber LLC. • GitHub is a registered trademark of GitHub, Inc. • JavaScript is a registered trademark of Oracle Corporation. • Python is a registered trademark of Python Software Foundation. • Unix is a registered trademark of The Open Group. • Linux is a registered trademark of Linus Torvalds. • Dropbox is a registered trademark of Dropbox, Inc.

Contact Information To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at www.fbi.gov/contact-us/field, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at [email protected]. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. To request incident response resources or technical assistance related to these threats, contact CISA at [email protected]. For NSA client requirements or general cybersecurity inquiries, contact the NSA Cybersecurity Requirements Center at 410-854-4200 or [email protected] Media Inquiries / Press Desk:

 NSA Media Relations, 443-634-0721, [email protected]  CISA Media Relations, 703-235-2010, [email protected]  FBI National Press Office, 202-324-3691, [email protected]

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 5

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

APPENDIX A: Chinese State-Sponsored Cyber Actors’ Observed Procedures Note: D3FEND techniques are based on the Threat Actor Procedure(s) and may not match automated mappings to ATT&CK techniques and sub-techniques.

Tactics: Reconnaissance [TA0043] Table I: Chinese state-sponsored cyber actors’ Reconnaissance TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Chinese state-sponsored cyber actors Minimize the amount and sensitivity of data have been assessed to perform available to external parties, for example: reconnaissance on Microsoft® 365 Active Scanning ®  Scrub user email addresses and contact lists [T1595] (M365), formerly Office 365, Detect: resources with the intent of further from public websites, which can be used for  Network Traffic gaining information about the social engineering, Analysis networks. These scans can be  Share only necessary data and information with o Connection Attempt automated, through Python® scripts, third parties, and Analysis [D3-CAA] to locate certain files, paths, or vulnerabilities. The cyber actors can  Monitor and limit third-party access to the Isolate: network. Gather Victim gain valuable information on the victim  Network Isolation Network Information network, such as the allocated Active scanning from cyber actors may be o Inbound Traffic [T1590] resources, an organization’s fully identified by monitoring network traffic for sources Filtering [D3-ITF] qualified domain name, IP address associated with botnets, adversaries, and known space, and open ports to target or bad IPs based on threat intelligence. exploit.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 6

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Tactics: Resource Development [TA0042] Table II: Chinese state-sponsored cyber actors’ Resource Development TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Acquire Infrastructure Chinese state-sponsored cyber actors Adversary activities occurring outside the [T1583] have been observed using VPSs from organization’s boundary of control and view makes cloud service providers that are mitigation difficult. Organizations can monitor for N/A physically distributed around the world unexpected network traffic and data flows to and to host malware and function as C2 from VPSs and correlate other suspicious activity Stage Capabilities nodes. that may indicate an active threat. [T1608]

Organizations may be able to identify malicious use of Cobalt Strike by:  Examining network traffic using Transport Layer Security (TLS) inspection to identify Cobalt Strike. Look for human generated vice machine- generated traffic, which will be more uniformly distributed.  Looking for the default Cobalt Strike TLS certificate. Chinese state-sponsored cyber actors Obtain Capabilities have been observed using Cobalt  Look at the user agent that generates the TLS [T1588]: traffic for discrepancies that may indicate faked N/A Strike® and tools from GitHub® on and malicious traffic.  Tools [T1588.002] victim networks.  Review the traffic destination domain, which may be malicious and an indicator of compromise.  Look at the packet's HTTP host header. If it does not match with the destination domain, it may indicate a fake Cobalt Strike header and profile.  Check the Uniform Resource Identifier (URI) of the flow to see if it matches one associated with

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 7

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Cobalt Strike's malleable C2 language. If discovered, additional recovery and investigation will be required.

Tactics: Initial Access [TA0001] Table III: Chinese state-sponsored cyber actors’ Initial Access TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques  Ensure all browsers and plugins are kept up to Detect: date.  Identifier Analysis o Homoglyph Detection  Use modern browsers with security features [D3-HD] turned on. o URL Analysis [D3-UA]  Restrict the use of unneeded websites, block  File Analysis unneeded downloads/attachments, block o Dynamic Analysis [D3- unneeded JavaScript®, restrict browser DA] Chinese state-sponsored cyber actors extensions, etc.

Drive By have been observed gaining access Isolate:  Use adblockers to help prevent malicious code Compromise to victim networks through watering  Execution Isolation served through advertisements from executing. [T1189] hole campaigns of typo-squatted o Hardware-based domains.  Use script blocking extensions to help prevent Process Isolation [D3- the execution of unneeded JavaScript, which HBPI] may be used during exploitation processes. o Executable Allowlisting [D3-EAL]  Use browser sandboxes or remote virtual environments to mitigate browser exploitation.  Network Isolation o DNS Denylisting [D3-  Use security applications that look for behavior DNSDL] used during exploitation, such as Windows o Outbound Traffic ® Defender Exploit Guard (WDEG). Filtering [D3-OTF]

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 8

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Review previously published alerts and advisories from NSA, CISA, and FBI, and diligently patch vulnerable applications known to be exploited by cyber actors. Refer to the Trends in Chinese Chinese state-sponsored cyber actors State-Sponsored Cyber Operations section for a have exploited known vulnerabilities non-inclusive list of resources. in -facing systems.[1] For Harden: Additional mitigations include: information on vulnerabilities known  Application Hardening to be exploited by Chinese state-  Consider implementing Web Application [D3-AH] sponsored cyber actors, refer to the Firewalls (WAF), which can prevent exploit  Platform Hardening Trends in Chinese State-Sponsored traffic from reaching an application. o Software Update [D3- SU] Cyber Operations section for a list of  Segment externally facing servers and services

resources. from the rest of the network with a demilitarized Detect: zone (DMZ). Chinese state-sponsored cyber actors  File Analysis [D3-FA] have also been observed:  Use multi-factor authentication (MFA) with  Network Traffic Analysis Exploit Public- strong factors and require regular re- o Client-server Facing Application  Using short-term VPS devices to scan and exploit vulnerable authentication. Profiling [D3-CSPP] [T1190] ® Microsoft Exchange Outlook Web  Disable protocols using weak authentication.  Process Analysis Access (OWA®) and plant o Process Spawn webshells.  Limit access to and between cloud resources Analysis with the desired state being a Zero Trust model. o Process Lineage  Targeting on-premises Identity and For more information refer to NSA Analysis [D3-PLA] Access Management (IdAM) and Cybersecurity Information Sheet: [Embracing a federation services in hybrid cloud Zero Trust Security Model]. Isolate: environments to gain access to Network Isolation cloud resources.  When possible, use cloud-based access  controls on cloud resources (e.g., cloud service o Inbound Traffic  Deploying a public proof of concept provider (CSP)-managed authentication Filtering [D3-ITF] (POC) exploit targeting a public- between virtual machines). facing appliance vulnerability.  Use automated tools to audit access logs for security concerns.  Where possible, enforce MFA for password resets.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 9

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques

 Do not include Application Programing Interface (API) keys in software version control systems where they can be unintentionally leaked.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 10

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

 Implement a user training program and simulated spearphishing emails to discourage users from visiting malicious websites or opening malicious attachments and re-enforce the appropriate user responses to spearphishing emails. Quarantine suspicious files with antivirus solutions.  Use a network intrusion prevention system Harden: Chinese state-sponsored cyber actors (IPS) to scan and remove malicious email  Message Hardening have been observed conducting attachments. o Message spearphishing campaigns. These Authentication [D3- email compromise attempts range  Block uncommon file types in emails that are MAN] from generic emails with mass not needed by general users (.exe, .jar,.vbs) o Transfer Agent targeted phishing attempts to  Use anti-spoofing and email authentication Authentication [D3- specifically crafted emails in targeted mechanisms to filter messages based on TAAN] social engineering lures. validity checks of the sender domain (using Phishing [T1566]: These compromise attempts use the Sender Policy Framework [SPF]) and integrity Detect:  Spearphishing of messages (using Domain Keys Identified cyber actors’ dynamic collection of  File Analysis Attachment Mail [DKIM]). Enabling these mechanisms VPSs, previously compromised o Dynamic Analysis [D3- [T1566.001] within an organization (through policies such as accounts, or other infrastructure in Domain-based Message Authentication, DA]  Spearphishing order to encourage engagement from Reporting, and Conformance [DMARC]) may  Identifier Analysis Link [T1566.002] the target audience through domain enable recipients (intra-org and cross domain) o Homoglyph Detection

typo-squatting and masquerading. to perform similar message filtering and [D3-HD] These emails may contain a validation. o URL Analysis [D3-UA] malicious link or files that will provide  Message Analysis the cyber actor access to the victim’s  Determine if certain websites that can be used o Sender MTA device after the user clicks on the for spearphishing are necessary for business Reputation Analysis malicious link or opens the operations and consider blocking access if [D3-SMRA] activity cannot be monitored well or if it poses a attachment. o Sender Reputation significant risk. Analysis [D3-SRA]  Prevent users from clicking on malicious links by stripping hyperlinks or implementing "URL defanging" at the Email Security Gateway or other email security tools.  Add external sender banners to emails to alert users that the email came from an external sender.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 11

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Chinese state-sponsored cyber actors have been observed:  Exploiting vulnerable devices  Many exploits can be mitigated by applying immediately after conducting scans available patches for vulnerabilities (such as for critical zero-day or publicly CVE-2019-11510, CVE-2019-19781, and CVE- disclosed vulnerabilities. The cyber Harden: 2020-5902) affecting external remote services. actors used or modified public proof  Software Update [D3- of concept code in order to exploit  Reset credentials after virtual private network SU] vulnerable systems. (VPN) devices are upgraded and reconnected to the external network.  Targeting Microsoft Exchange Detect: offline address book (OAB) virtual  Revoke and generate new VPN server keys  Network Traffic Analysis o Connection Attempt External Remote directories (VDs). and certificates (this may require redistributing Analysis [D3-CAA] Services [T1133] VPN connection information to users).  Exploiting Internet accessible  Platform Monitoring [D3- webservers using webshell small  Disable Remote Desktop Protocol (RDP) if not PM] code injections against multiple required for legitimate business functions.  Process Analysis code languages, including net, o Process Spawn asp, apsx, php, japx, and cfm.  Restrict VPN traffic to and from managed service providers (MSPs) using a dedicated Analysis [D3-SPA] Note: refer to the references listed VPN connection. . Process Lineage above in Exploit Public-Facing Analysis [D3-PLA] Application [T1190] for information on  Review and verify all connections between customer systems, service provider systems, CVEs known to be exploited by and other client enclaves. malicious Chinese cyber actors. Note: this technique also applies to Persistence [TA0003].

Chinese state-sponsored cyber actors  Adhere to best practices for password and Harden: Valid Accounts have been observed: gaining permission management.  Credential Hardening [T1078]: credential access into victim networks  Ensure that MSP accounts are not assigned to o Multi-factor by using legitimate, but compromised administrator groups and restrict those Authentication [D3-  Default Accounts credentials to access OWA servers, accounts to only systems they manage MFA] [T1078.001] corporate login portals, and victim  Do not store credentials or sensitive data in  Domain Accounts networks. Detect: plaintext. [T1078.002] Note: this technique also applies to  User Behavior Analysis Persistence [TA0003], Privilege  Change all default usernames and passwords. [D3-UBA]

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 12

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Escalation [TA0004], and Defense o Authentication Event  Routinely update and secure applications using Evasion [TA0005]. Thresholding [D3- Secure Shell (SSH). ANET]  Update SSH keys regularly and keep private o Job Function Access keys secure. Pattern Analysis [D3- JFAPA]  Routinely audit privileged accounts to identify malicious use.

Tactics: Execution [TA0002] Table IV: Chinese state-sponsored cyber actors’ Execution TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Command and PowerShell Scripting Interpreter Chinese state-sponsored cyber  Turn on PowerShell logging. (Note: this works [T1059]: actors have been observed: better in newer versions of PowerShell. NSA, Harden:  PowerShell®  Using cmd.exe, JavaScript/Jscript CISA, and FBI recommend using version 5 or  Platform Hardening [T1059.001] Interpreter, and network device higher.) [D3-PH] command line interpreters (CLI).  Windows®  Push Powershell logs into a security information Command Shell  Using PowerShell to conduct and event management (SIEM) tool. Detect:  Process Analysis [T1059.003] reconnaissance, enumeration,  Monitor for suspicious behavior and commands. o Script Execution and discovery of the victim Regularly evaluate and update blocklists and ® Analysis [D3-SEA]  Unix Shell network. allowlists. [T1059.004]  Employing Python scripts to  Use an antivirus program, which may stop Isolate:  Python [T1059.006] exploit vulnerable servers. malicious code execution that cyber actors  Execution Isolation attempt to execute via PowerShell. o  JavaScript  Using a UNIX shell in order to Executable [T1059.007] conduct discovery, enumeration,  Remove PowerShell if it is not necessary for Allowlisting [D3-EAL] ® and lateral movement on Linux operations.  Network Device CLI servers in the victim network. [T1059.008]  Restrict which commands can be used.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 13

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques

Windows Command Shell  Restrict use to administrator, developer, or power user systems. Consider its use suspicious and investigate, especially if average users run scripts.  Investigate scripts running out of cycle from patching or other administrator functions if scripts are not commonly used on a system, but enabled.  Monitor for and investigate other unusual or suspicious scripting behavior. Unix  Use application controls to prevent execution.  Monitor for and investigate unusual scripting behavior. Use of the Unix shell may be common on administrator, developer, or power user systems. In this scenario, normal users running scripts should be considered suspicious.  If scripts are not commonly used on a system, but enabled, scripts running out of cycle from patching or other administrator functions should be considered suspicious. Python  Audit inventory systems for unauthorized Python installations.  Blocklist Python where not required.  Prevent users from installing Python where not required. JavaScript

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 14

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques  Turn off or restrict access to unneeded scripting components.  Blocklist scripting where appropriate.  For malicious code served up through ads, adblockers can help prevent that code from executing. Network Device Command Line Interface (CLI)  Use TACACS+ to keep control over which commands administrators are permitted to use through the configuration of authentication and command .  Use an authentication, authorization, and accounting (AAA) systems to limit actions administrators can perform and provide a history of user actions to detect unauthorized use and abuse.  Ensure least privilege principles are applied to user accounts and groups.

 Monitor scheduled task creation from common Detect: utilities using command-line invocation and  Platform Monitoring Chinese state-sponsored cyber compare for any changes that do not correlate o actors have been observed using with known software, patch cycles, or other Monitoring [D3-OSM] Scheduled Task/Job Cobalt Strike, webshells, or administrative activity. . Scheduled Job command line interface tools, such [T1053]  Configure event logging for scheduled task Analysis [D3-SJA] as schtask or crontab to create . System Daemon  Cron [T1053.003] creation and monitor process execution from and schedule tasks that enumerate Monitoring [D3- victim devices and networks. svchost.exe (Windows 10) and Windows Task  Scheduled Task Scheduler (Older version of Windows) to look for SDM] [T1053.005] Note: this technique also applies to changes in %systemroot%\System32\Tasks . System File Persistence [TA0003] and Privilege that do not correlate with known software, patch Analysis [D3-SFA] Escalation [TA0004]. cycles, or other administrative activity. Additionally monitor for any scheduled tasks Isolate: created via command line utilities—such as  Execution Isolation

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 15

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques PowerShell or Windows Management o Executable Instrumentation (WMI)—that do not conform to Allowlisting [D3-EAL] typical administrator or user actions.

Detect:  File Analysis  Use an antivirus program, which may stop o Dynamic Analysis malicious code execution that cyber actors [D3-DA] convince users to attempt to execute. o File Content Rules [D3-FCR]  Prevent unauthorized execution by disabling  Identifier Analysis macro scripts from Microsoft Office files o Homoglyph transmitted via email. Consider using Office Detection [D3-HD] Chinese state-sponsored cyber Viewer software to open Microsoft Office files o actors have been observed transmitted via email instead of full Microsoft URL Analysis [D3- UA] User Execution conducting spearphishing Office suite applications. campaigns that encourage  Network Traffic [T1204]  Use a domain reputation service to detect and engagement from the target Analysis block suspicious or malicious domains.  Malicious Link audience. These emails may contain o DNS Traffic Analysis [T1204.001] a malicious link or file that provide  Determine if certain categories of websites are [D3-DNSTA]

 Malicious File the cyber actor access to the necessary for business operations and consider Isolate: [T1204.002] victim’s device after the user clicks blocking access if activity cannot be monitored on the malicious link or opens the well or if it poses a significant risk.  Execution Isolation attachment. o Hardware-based  Ensure all browsers and plugins are kept up to Process Isolation date. [D3-HBPI]  Use modern browsers with security features o Executable turned on. Allowlisting [D3-EAL]  Network Isolation  Use browser and application sandboxes or o DNS Denylisting [D3- remote virtual environments to mitigate browser or other application exploitation. DNSDL] o Outbound Traffic Filtering [D3-OTF]

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 16

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Tactics: Persistence [TA0003] Table V: Chinese state-sponsored cyber actors’ Persistence TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques  Disallow loading of remote DLLs. Detect:  Platform Monitoring  Enable safe DLL search mode. o Operating System Chinese state-sponsored cyber Monitoring actors have been observed using  Implement tools for detecting search order . Service Binary benign executables which used hijacking opportunities. Hijack Execution Flow Verification [D3- Dynamic Link Library (DLL) load- [T1574]:  Use application allowlisting to block unknown SBV] order hijacking to activate the DLLs.  Process Analysis  DLL Search Order malware installation process. Hijacking  Monitor the file system for created, moved, and o File Access Pattern [T1574.001] Note: this technique also applies to renamed DLLs. Analysis [D3-FAPA] Privilege Escalation [TA0004] and  Monitor for changes in system DLLs not Defense Evasion [TA0005]. Isolate: associated with updates or patches.  Execution Isolation  Monitor DLLs loaded by processes (e.g., o Executable legitimate name, but abnormal path). Allowlisting [D3-EAL]  Monitor for policy changes to authentication mechanisms used by the domain controller.  Monitor for modifications to functions exported Detect: Chinese state-sponsored cyber from authentication DLLs (such as  Process Analysis [D3- actors were observed creating a cryptdll.dll and samsrv.dll). PA] Modify Authentication new sign-in policy to bypass MFA User Behavior Analysis  Configure robust, consistent account activity  Process [T1556] o requirements to maintain access to audit policies across the enterprise and with Authentication Event  Domain Controller the victim network. externally accessible services. Thresholding [D3- ANET] Authentication Note: this technique also applies to  Look for suspicious account behavior across o User Geolocation [T1556.001] Defense Evasion [TA0005] and systems that share accounts, either user, admin, Logon Pattern Credential Access [TA0006]. or service accounts (for example, one account Analysis [D3- logged into multiple systems simultaneously, UGLPA] multiple accounts logged into the same machine simultaneously, accounts logged in at odd times or outside of business hours).

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 17

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques

 Correlate other security systems with login information (e.g., a user has an active login session but has not entered the building or does not have VPN access).  Monitor for new, unfamiliar DLL files written to a domain controller and/or local computer. Monitor for and correlate changes to Registry entries.  Use Intrusion Detection Systems (IDS) to monitor for and identify China Chopper traffic using IDS signatures.  Monitor and search for predictable China Detect: Chopper shell syntax to identify infected files on  Network Traffic hosts. Analysis o Client-server  Perform integrity checks on critical servers to Payload Profiling identify and investigate unexpected changes. [D3-CSPP]  Have application developers sign their code o Per Host Download- Chinese state-sponsored cyber using digital signatures to verify their identity. Upload Ratio Server Software actors have been observed planting Analysis [D3- Component [T1505]: web shells on exploited servers and  Identify and remediate web application PHDURA] vulnerabilities or configuration weaknesses. using them to provide the cyber  Process Analysis  Employ regular updates to applications and host actors with access to the victim o Process Spawn [T1505.003] operating systems. networks. Analysis  Implement a least-privilege policy on web . Process Lineage servers to reduce adversaries’ ability to escalate Analysis [D3-PLA] privileges or pivot laterally to other hosts and control creation and execution of files in Isolate: particular directories.  Network Isolation  If not already present, consider deploying a o Inbound Traffic DMZ between web-facing systems and the Filtering [D3-ITF] corporate network. Limiting the interaction and logging traffic between the two provides a method to identify possible malicious activity.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 18

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques

 Ensure secure configuration of web servers. All unnecessary services and ports should be disabled or blocked. Access to necessary services and ports should be restricted, where feasible. This can include allowlisting or blocking external access to administration panels and not using default login credentials.  Use a reverse proxy or alternative service, such as mod_security, to restrict accessible URL paths to known legitimate ones.  Establish, and backup offline, a “known good” version of the relevant server and a regular change management policy to enable monitoring for changes to servable content with a file integrity system.  Employ user input validation to restrict exploitation of vulnerabilities.  Conduct regular system and application vulnerability scans to establish areas of risk. While this method does not protect against zero- day exploits, it will highlight possible areas of concern.  Deploy a web application and conduct regular virus signature checks, application , code reviews, and server network analysis.  Only allow authorized administrators to make Create or Modify Chinese state-sponsored cyber service changes and modify service System Process actors have been observed configurations. Detect: [T1543]: executing malware shellcode and  Process Analysis  Monitor processes and command-line batch files to establish new services o Process Spawn  Windows Service arguments for actions that could create or to enable persistence. Analysis [D3-PSA] [T1543.003] modify services, especially if such modifications are unusual in your environment.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 19

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Note: this technique also applies to  Monitor WMI and PowerShell for service Privilege Escalation [TA0004]. modifications.

Tactics: Privilege Escalation [TA0004] Table VI: Chinese state-sponsored cyber actors’ Privilege Escalation TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques  Identify and correct Group Policy Object (GPO) Detect: permissions abuse opportunities (e.g., GPO  Network Traffic Chinese state-sponsored cyber modification privileges) using auditing tools. Analysis Domain Policy actors have also been observed o Administrative Modification [T1484] modifying group policies for  Monitor directory service changes using Network Activity Windows event logs to detect GPO password exploitation. Analysis [D3-ANAA]  Group Policy modifications. Several events may be logged for  Platform Monitoring Modification Note: this technique also applies to such GPO modifications. o Operating System [T1484.001] Defense Evasion [TA0005].  Consider implementing WMI and security Monitoring filtering to further tailor which users and . System File computers a GPO will apply to. Analysis [D3-SFA] Detect: Process Injection Chinese state-sponsored cyber  Use endpoint protection software to block  Process Analysis [T1055]: actors have been observed: process injection based on behavior of the o Process Self- injection process. Modification  Dynamic Link  Injecting into the rundll32.exe Library Injection process to hide usage of  Monitor DLL/Portable Executable (PE) file Detection [D3- [T1055.001] Mimikatz, as well as injecting into events, specifically creation of these binary files PSMD] o System Call Analysis  Portable Executable a running legitimate as well as the loading of DLLs into processes. [D3-SCA] Injection explorer.exe process for lateral Look for DLLs that are not recognized or not

[T1055.002] movement. normally loaded into a process. Isolate:

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 20

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques  Execution Isolation  Using shellcode that injects  Monitor for suspicious sequences of Windows o Hardware-based implants into newly created API calls such as CreateRemoteThread, Process Isolation instances of the Service Host VirtualAllocEx, or WriteProcessMemory and [D3-HBPI] process (svchost). analyze processes for unexpected or atypical o behavior such as opening network connections Mandatory Access Note: this technique also applies to or reading files. Control [D3-MAC] Defense Evasion [TA0005].  To minimize the probable impact of a threat actor using Mimikatz, always limit administrative privileges to only users who actually need it; upgrade Windows to at least version 8.1 or 10; run Local Security Authority Subsystem Service (LSASS) in protected mode on Windows 8.1 and higher; harden the local security authority (LSA) to prevent code injection.

Tactics: Defense Evasion [TA0005] Table VII: Chinese state-sponsored cyber actors’ Defensive Evasion TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques  Monitor the execution file paths and command- Detect: line arguments for common archive file  Process Analysis Chinese state-sponsored cyber applications and extensions, such as those for o Process Spawn Zip and RAR archive tools, and correlate with Deobfuscate/Decode actors were observed using the 7- Analysis [D3-PSA] other suspicious behavior to reduce false Files or Information Zip utility to unzip imported tools and positives from normal user and administrator [T1140] malware files onto the victim device. Isolate: behavior.  Execution Isolation  Consider blocking, disabling, or monitoring use o Executable of 7-Zip. Denylisting [D3-EDL] Chinese state-sponsored cyber  Monitor files, processes, and command-line Detect: Hide Artifacts [T1564] actors were observed using benign arguments for actions indicative of hidden  Process Analysis

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 21

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques executables which used DLL load- artifacts, such as executables using DLL load- o File Access Pattern order hijacking to activate the order hijacking that can activate malware. Analysis [D3-FAPA] malware installation process.  Monitor event and authentication logs for records of hidden artifacts being used. Isolate:  Execution Isolation  Monitor the file system and shell commands for o Executable hidden attribute usage. Allowlisting [D3-EAL]  Make the environment variables associated with command history read only to ensure that the history is preserved.  Recognize timestomping by monitoring the contents of important directories and the Detect: attributes of the files.  Platform Monitoring o Operating System Chinese state-sponsored cyber  Prevent users from deleting or writing to certain Monitoring actors have been observed deleting files to stop adversaries from maliciously altering . System File files using rm or del commands. their ~/.bash_history or Analysis [D3-SFA] ConsoleHost_history.txt files. Indicator Removal Several files that the cyber actors  Process Analysis from Host [T1070] target would be timestomped, in  Monitor for command-line deletion functions to o File Access Pattern order to show different times correlate with binaries or other files that an Analysis [D3-FAPA] compared to when those files were adversary may create and later remove. Monitor created/used. for known deletion and secure deletion tools that Isolate: are not already on systems within an enterprise  Execution Isolation network that an adversary could introduce. o Executable  Monitor and record file access requests and file Allowlisting [D3-EAL] handles. An original file handle can be correlated to a compromise and inconsistencies between file timestamps and previous handles opened to them can be a detection rule. Chinese state-sponsored cyber Consider utilizing the Antimalware Scan Interface Detect: Obfuscated Files or actors were observed Base64 (AMSI) on Windows 10 to analyze commands after  Process Analysis Information [T1027] encoding files and command strings being processed/interpreted. o File Access Pattern to evade security measures. Analysis [D3-FAPA]

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 22

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques

Chinese state-sponsored cyber Signed Binary Proxy actors were observed using Monitor processes for the execution of known Execution [T1218] Detect: Microsoft signed binaries, such as proxy binaries (e.g., rundll32.exe) and look for  Process Analysis  Mshta [T1218.005] Rundll32, as a proxy to execute anomalous activity that does not follow historically o File Access Pattern malicious payloads. good arguments and loaded DLLs associated with  Rundll32 the invocation of the binary. Analysis [D3-FAPA] [T1218.011] o Process Spawn Analysis [D3-PSA]

Tactics: Credential Access [TA0006] Table VIII: Chinese state-sponsored cyber actors’ Credential Access TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Harden:  Platform Hardening Chinese state-sponsored cyber o Software Update actors have been observed  Update and patch software regularly. [D3-SU] Exploitation for exploiting Pulse Secure VPN  Use cyber threat intelligence and open-source  Credential Hardening Credential Access appliances to view and extract valid reporting to determine vulnerabilities that threat o Multi-factor [T1212] user credentials and network actors may be actively targeting and exploiting; Authentication [D3- information from the servers. patch those vulnerabilities immediately. MFA]

Harden:  Monitor process and command-line arguments OS Credential  Credential Hardening Chinese state-sponsored cyber for program execution that may be indicative of Dumping [T1003] credential dumping, especially attempts to [D3-CH] actors were observed targeting the  LSASS Memory access or copy the NDST.DIT. LSASS process or Active directory Detect: [T1003.001] (NDST.DIT) for credential dumping.  Ensure that local administrator accounts have  Process Analysis  NTDS [T1003.003] complex, unique passwords across all systems o File Access Pattern on the network. Analysis [D3-FAPA]

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 23

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques o System Call Analysis  Limit credential overlap across accounts and [D3-SCA] systems by training users and administrators not

to use the same passwords for multiple accounts. Isolate:  Execution Isolation  Consider disabling or restricting NTLM. o Hardware-based Process Isolation  Consider disabling WDigest authentication. [D3-HBPI]  Ensure that domain controllers are backed up o Mandatory Access and properly secured (e.g., encrypt backups). Control [D3-MAC]  Implement Credential Guard to protect the LSA secrets from credential dumping on Windows 10. This is not configured by default and requires hardware and firmware system requirements.  Enable Protected Process Light for LSA on Windows 8.1 and Windows Server 2012 R2.

Tactics: Discovery [TA0007] Table IX: Chinese state-sponsored cyber actors’ Discovery TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Detect:  User Behavior Analysis Chinese state-sponsored cyber Monitor processes and command-line arguments o Job Function Access actors have been observed using Pattern Analysis [D3- File and Directory for actions that could be taken to gather system multiple implants with file system JFAPA] Discovery [T1083] and network information. WMI and PowerShell enumeration and traversal should also be monitored.  Process Analysis capabilities. o Database Query String Analysis [D3- DQSA]

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 24

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques o File Access Pattern Analysis [D3-FAPA] o Process Spawn Analysis [D3-PSA] Monitor processes and command-line arguments Detect: Chinese state-sponsored cyber for actions that could be taken to gather system  Process Analysis actors have been observed using and network information. Remote access tools o Process Spawn Permission Group commands, including net group with built-in features may interact directly with the Analysis [D3-PSA] Discovery [T1069] and net localgroup, to enumerate Windows API to gather information. Information o System Call Analysis the different user groups on the may also be acquired through Windows system [D3-SCA] target network. management tools such as Windows Management  User Behavior Analysis Instrumentation and PowerShell. [D3-UBA] Normal, benign system and network events that look like process discovery may be uncommon, depending on the environment and how they are Detect: used. Monitor processes and command-line  Process Analysis Chinese state-sponsored cyber arguments for actions that could be taken to o Process Spawn actors have been observed using Process Discovery gather system and network information. Remote Analysis [D3-PSA] commands, including tasklist, jobs, [T1057] access tools with built-in features may interact o System Call Analysis ps, or taskmgr, to reveal the running directly with the Windows API to gather [D3-SCA] processes on victim devices. information. Information may also be acquired  User Behavior Analysis through Windows system management tools such [D3-UBA] as Windows Management Instrumentation and PowerShell.

 Ensure that unnecessary ports and services are Detect: closed to prevent discovery and potential  Network Traffic Chinese state-sponsored cyber exploitation. Analysis o Connection Attempt actors have been observed using  Use network intrusion detection and prevention Network Service Analysis [D3-CAA] Nbtscan and nmap to scan and systems to detect and prevent remote service Scanning [T1046] enumerate target network scans such as Nbtscan or nmap. information. Isolate:  Ensure proper network segmentation is followed  Network Isolation to protect critical servers and devices to help o Inbound Traffic mitigate potential exploitation. Filtering [D3-ITF]

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 25

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Detect: Chinese state-sponsored cyber  Process Analysis actors have been observed using Monitor for processes that can be used to discover o Process Spawn Remote System Base-64 encoded commands, remote systems, such as ping.exe and Analysis [D3-PSA] Discovery [T1018] including ping, net group, and net tracert.exe, especially when executed in quick  User Behavior Analysis user to enumerate target network succession. o Job Function Access information. Pattern Analysis [D3- JFAPA]

Tactics: Lateral Movement [TA0008] Table X: Chinese state-sponsored cyber actors’ Lateral Movement TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Chinese state-sponsored cyber actors used valid accounts to log Detect: into a service specifically designed  Network Traffic to accept remote connections, such  Disable or remove unnecessary services. Analysis o as telnet, SSH, RDP, and Virtual  Minimize permissions and access for service Remote Terminal Network Computing (VNC). The accounts. Session Detection actor may then perform actions as [D3-RTSD] Exploitation of Remote the logged-on user.  Perform vulnerability scanning and update  User Behavior Analysis Services [T1210] software regularly. [D3-UBA] Chinese state-sponsored cyber

actors also used on-premises  Use threat intelligence and open-source Isolate: Identity and Access Management exploitation databases to determine services  Execution Isolation (IdAM) and federation services in that are targets for exploitation. o Mandatory Access hybrid cloud environments in order Control [D3-MAC] to pivot to cloud resources.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 26

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Tactics: Collection [TA0009] Table XI: Chinese state-sponsored cyber actors’ Collection TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Detect:  Process Analysis Chinese state-sponsored cyber o File Access Pattern actors used compression and  Scan systems to identify unauthorized archival Analysis [D3-FAPA] utilities or methods unusual for the environment. o Process Spawn Archive Collected of exfiltration files into Analysis [D3-PSA] Data [T1560] RAR archives, and subsequently  Monitor command-line arguments for known utilizing cloud storage services for archival utilities that are not common in the storage. organization's environment. Isolate:  Execution Isolation o Executable Denylisting [D3-EDL] Detect:  Access to the clipboard is a legitimate function  Network Traffic of many applications on an operating system. If Analysis an organization chooses to monitor for this o behavior, then the data will likely need to be Remote Terminal Chinese state-sponsored cyber correlated against other suspicious or non-user- Session Detection [D3-RTSD] Clipboard Data actors used RDP and execute driven activity (e.g. excessive use of

[T1115] rdpclip.exe to exfiltrate pbcopy/pbpaste (Linux) or clip.exe information from the clipboard. (Windows) run by general users through Isolate: command line).  Network Isolation o Inbound Traffic  If possible, disable use of RDP and other file Filtering [D3-ITF] sharing protocols to minimize a malicious actor's o Outbound Traffic ability to exfiltrate data. Filtering [D3-OTF] Chinese state-sponsored cyber Processes that appear to be reading files from actors have been observed using disparate locations and writing them to the same the mv command to export files into directory or file may be an indication of data being Detect: a location, like a compromised staged, especially if they are suspected of  Process Analysis Data Staged [T1074] Microsoft Exchange, IIS, or performing encryption or compression on the files, o File Access Pattern emplaced webshell prior to such as using 7-Zip, RAR, ZIP, or zlib. Monitor Analysis [D3-FAPA] compressing and exfiltrating the publicly writeable directories, central locations, data from the target network. and commonly used staging directories (recycle

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 27

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques bin, temp folders, etc.) to regularly check for compressed or encrypted data that may be indicative of staging.

Harden:  Credential Hardening o Multi-factor Chinese state-sponsored cyber  Audit email auto-forwarding rules for suspicious Authentication [D3- actors have been observed using or unrecognized rulesets. MFA] Email Collection the New-MailboxExportRequest  Message Hardening  Encrypt email using public key cryptography, [T1114] PowerShell cmdlet to export target o Message Encryption where feasible. email boxes. [D3-MENCR]  Use MFA on public-facing mail servers. Detect:  Process Analysis [D3- PA]

Tactics: Command and Control [TA0011] Table XII: Chinese state-sponsored cyber actors’ Command and Control TTPs with detection and mitigation recommendations

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Detect: Chinese state-sponsored cyber  Network Traffic actors have been observed: Analysis  Using commercial cloud storage o Client-server services for command and Use network intrusion detection and prevention Payload Profiling Application Layer control. systems with network signatures to identify traffic [D3-CSPP] Protocol [T1071] o File Carving [D3-FC]  Using malware implants that use for specific adversary malware.

the Dropbox® API for C2 and a Isolate: downloader that downloads and Network Isolation executes a payload using the  o DNS Denylisting [D3- Microsoft OneDrive® API. DNSDL]

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 28

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques Chinese state-sponsored cyber  Perform ingress traffic analysis to identify actors have been observed transmissions that are outside of normal network importing tools from GitHub or behavior. Isolate: infected domains to victim networks.  Do not expose services and protocols (such as Ingress Tool Transfer  Network Isolation In some instances. Chinese state- File Transfer Protocol [FTP]) to the Internet [T1105] o Inbound Traffic sponsored cyber actors used the without strong business justification. Server Message Block (SMB) Filtering [D3-ITF] protocol to import tools into victim  Use signature-based network intrusion detection networks. and prevention systems to identify adversary malware coming into the network. Detect:  Network Traffic Analysis  Use signature-based network intrusion detection o Client-server and prevention systems to identify adversary Payload Profiling Chinese state-sponsored cyber malware calling back to C2. [D3-CSPP] actors have been observed using a o Protocol Metadata Non-Standard Port  Configure firewalls to limit outgoing traffic to only Anomaly Detection non-standard SSH port to establish required ports based on the functions of that [T1571] [D3-PMAD] covert communication channels with network segment. VPS infrastructure.  Analyze packet contents to detect Isolate: communications that do not follow the expected  Network Isolation protocol behavior for the port. o Inbound Traffic Filtering [D3-ITF] o Outbound Traffic Filtering [D3-OTF]  Monitor systems for connections using ports/protocols commonly associated with Chinese state-sponsored cyber tunneling, such as SSH (port 22). Also monitor Detect: actors have been observed using for processes commonly associated with  Network Traffic Protocol Tunneling tools like dog-tunnel and tunneling, such as Plink and the OpenSSH Analysis [T1572] dns2tcp.exe to conceal C2 traffic client. o Protocol Metadata with existing network activity. Anomaly Detection  Analyze packet contents to detect application [D3-PMAD] layer protocols that do not follow the expected protocol standards.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 29

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Threat Actor Defensive Tactics and Technique / Threat Actor Procedure(s) Detection and Mitigation Recommendations Techniques Sub-Techniques

 Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server) Monitor traffic for encrypted communications Detect: originating from potentially breached routers to Chinese state-sponsored cyber  Network Traffic actors have been observed using a other routers within the organization. Compare the Analysis source and destination with the configuration of network of VPSs and small office o Protocol Metadata Proxy [T1090]: and home office (SOHO) routers as the device to determine if these channels are Anomaly Detection part of their operational authorized VPN connections or other encrypted [D3-PMAD]  Multi-Hop Proxy modes of communication. [T1090.003] infrastructure to evade detection and o Relay Pattern host C2 activity. Some of these  Alert on traffic to known anonymity networks Analysis [D3-RPA] nodes operate as part of an (such as Tor) or known adversary infrastructure encrypted proxy service to prevent that uses this technique. Isolate: attribution by concealing their  Network Isolation  Use network allow and blocklists to block traffic country of origin and TTPs. o Outbound Traffic to known anonymity networks and C2 Filtering [D3-OTF] infrastructure.

U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 30

NSA, CISA, & FBI | Chinese State-Sponsored Cyber Operations: Observed TTPs

Appendix B: MITRE ATT&CK Framework1 Resource Privilege Defense Credential Lateral Command and Reconnaissance Initial Access Execution Persistence Discovery Collection Development Escalation Evasion Access Movement Control Command and Deobfuscate/ Active Scanning Acquire Drive-by Scripting Create or Modify Create or Modify Decode Files Exploitation for File and Directory Exploitation of Archive Application Infrastructure Compromise System Process System Process Credential Access Discovery Remote Services Collected Data Layer Protocol Interpreter or Information Gather Victim Exploit Public- Domain Policy Modify Network Service Ingress Tool Network Obtain Capabilities Facing JavaScript Windows Service Windows Service Authentication Clipboard Data Information Application Modification Process Scanning Transfer Domain Tools External Remote Network Device External Remote Domain Policy Group Policy Controller Permission Data Staged Non-Standard Services CLI Services Modi cation Modification Groups Discovery Port Authentication Hijack Execution Group Policy Hide OS Credential Stage Capabilities Phishing PowerShell Flow Modification Artifacts Dumping Process Discovery Email Collection Protocol Tunneling

Spearphishing DLL Search Hijack Hijack Remote System Python LSASS Memory Proxy Attachment Order Hijacking Execution Flow Execution Flow Discovery Modify Spearphishing DLL Search DLL Search Link Unix Shell Authentication Order Hijacking Order Hijacking NTDS Multi-hop Proxy Process Valid Windows Domain Indicator Removal Controller Process Injection Accounts Command Shell Authentication on Host Modify Scheduled Scheduled Dynamic-link Default Accounts Task/Job Task/Job Library Injection Authentication Process Domain Portable Domain Cron Cron Executable Controller Accounts Injection Authentication

Scheduled Task Scheduled Task Scheduled Obfuscated Files Task/Job or Information

Server Software User Execution Component Cron Process Injection

Dynamic-link Malicious file Web Shell Scheduled Task Library Injection Portable Malicious Link Valid Accounts Valid Accounts Executable Injection Signed Binary Default Accounts Default Accounts Proxy Execution

Domain Domain Mshta Accounts Accounts

Rundll32

Legend Valid Accounts

Technique Default Accounts

Domain Sub-technique Accounts

Figure 2: MITRE ATT&CK Enterprise tactics and techniques used by Chinese state-sponsored cyber actors (Click here for the downloadable JSON file.)

1 Visualization created using Mitre’s ATT&CK® NAVIGATOR (https://github.com/mitre/attack-navigator). U/OO/163624-21 | PP-21-0971 | JUL 2021 Ver. 1.0 31