APT12 / Numbered Panda
A PLA-linked espionage group whose defining characteristic is a relentless, documented pattern of reading its own threat intelligence coverage and retooling to defeat every published detection method — sometimes within weeks of a vendor report. Best known for breaching the New York Times in 2012 in apparent retaliation for an investigation into a Chinese premier's family wealth, APT12 has operated with a sustained focus on Taiwan, Japan, and media organizations since at least 2009.
Overview
APT12 — tracked by FireEye as G0005, designated Numbered Panda by CrowdStrike, and known to the broader research community by the names of its malware families, IXESHE and ETUMBOT — is a Chinese cyber espionage group linked to the People's Liberation Army. Active since at least 2009, the group conducts sustained intelligence collection operations against Taiwanese and Japanese government entities, media organizations, high-technology companies, electronics manufacturers, and telecommunications providers. Its targeting profile is tightly correlated with PRC strategic interests: cross-strait tensions, regional competition with Japan, and the suppression of journalism unfavorable to CCP leadership.
Trend Micro first formally documented the group in a 2012 white paper describing sustained IXESHE campaigns against East Asian governments since approximately 2009. CrowdStrike gave the group its best-known English name — Numbered Panda — in a March 2013 post published in the wake of the New York Times breach disclosure. The aliases DynCalc and DNSCalc refer to one of the group's most technically distinctive tradecraft elements: a method of dynamically calculating command-and-control communication ports using arithmetic performed on the octets of a resolved DNS IP address — meaning no hard-coded port appears in the malware binary, significantly complicating network-level detection.
The group's most high-profile operation was the breach of the New York Times beginning in September 2012. The intrusion was directly tied to the newspaper's investigation into the family wealth of then-Premier Wen Jiabao, whose Chinese-language edition was blocked in China the day the story was published. Mandiant, hired to investigate, found that the attackers had spent two weeks quietly mapping the Times network before locating the domain controller, extracted password hashes for every Times employee, cracked them, and used the resulting credentials to access 53 workstations. The primary targets were the email accounts of Shanghai bureau chief David Barboza — who wrote the Wen investigation — and Jim Yardley, the former Beijing bureau chief then serving as South Asia bureau chief based in India. APT12 deployed 45 custom malware samples across the 53 compromised machines during the intrusion — an unusually high ratio for the number of systems involved, noted by Mandiant CSO Richard Bejtlich as evidence of a highly focused, operationally responsive adversary.
What has made APT12 particularly notable in the threat intelligence community is not just the scale or nature of its operations, but its systematic response to public disclosure. Twice in documented history — once after the New York Times breach was reported in January 2013, and again after Arbor Networks published technical details on ETUMBOT in June 2014 — the group paused operations, read the published research, identified precisely which detection methods had been described, and deployed updated malware variants that specifically defeated each one. FireEye documented this pattern in a September 2014 blog post by Moran, Oppenheim, Engle, and Wartell, dubbing it "Darwin's Favorite APT Group" — observing that APT12 evolves like a biological organism under selection pressure, treating each published detection report as a blueprint for evasion. This makes static IOC-based defense almost useless against APT12; only behavioral detection is durable.
Attribution to the PLA is based on Mandiant's 2013 analysis linking APT12 and APT1 to the same unit-level infrastructure — specifically university computers previously associated with Chinese military contractor activity — and on consistent targeting alignment with PRC strategic interests. No specific PLA unit has been publicly named for APT12 as was done for APT1's Unit 61398. The PRC has denied involvement. APT12 has received no DOJ indictment to date.
Target Profile
APT12's targeting is geographically concentrated and politically driven. Taiwan is the sustained primary target, with operations consistently aligned to cross-strait tensions and Taiwanese government activities. Japan emerged as a secondary focus after 2013. Western media organizations have also been targeted where their reporting intersects with PRC leadership interests — the Times breach being the clearest example, but Mandiant noted at the time that a December 2012 intelligence report flagged APT-style intrusions at 30 journalists and executives across multiple Western news outlets.
- Taiwanese Government: The sustained core target. APT12 has repeatedly targeted Taiwanese government ministries, agencies, and affiliated organizations. Spear-phishing lures are typically written in Traditional Chinese and reference current Taiwanese government events, conferences, and policy topics — indicating deep familiarity with the target environment. FireEye documented that in at least one 2014 campaign, phishing emails were sent from valid compromised Taiwanese government employee accounts, bypassing sender reputation defenses entirely.
- Media Organizations: APT12 has demonstrated a clear mandate to surveil and suppress unfavorable reporting on PRC leadership. The New York Times breach is the documented anchor case, but the group's broader pattern of targeting journalists is consistent with PLA information operations doctrine — not just collection, but identifying sources, understanding what evidence reporters hold, and mapping journalistic networks.
- Japanese Government and Defense: Japan became an elevated target after 2013, particularly government agencies and defense-adjacent contractors. The Arbor Networks 2014 report documented an ETUMBOT campaign targeting Taiwanese and Japanese organizations simultaneously, with lure documents tailored to each audience.
- Electronics Manufacturers: East Asian electronics firms — primarily in Taiwan and Japan — are recurrent targets, consistent with Chinese industrial espionage priorities around semiconductor, display, and consumer electronics technology.
- Telecommunications Providers: Telecom operators in Taiwan and Japan have been targeted for network infrastructure intelligence and subscriber data, with secondary value as platforms for accessing downstream customers.
- High-Technology Companies: Technology firms across East Asia are targeted for IP aligned with PRC Five Year Plan industrial priorities in advanced manufacturing, clean energy, and aerospace.
- Defense Industrial Base: Japanese defense contractors have been documented targets, with intrusion objectives consistent with collection on defense procurement, weapons system specifications, and alliance coordination with U.S. forces.
Tactics, Techniques & Procedures
APT12's core technique set has remained relatively stable since 2009 — spear-phishing for initial access, custom backdoor implantation for persistence, credential theft for lateral movement, and C2 communication via HTTP with encryption. What evolves is the specific implementation of each component after public exposure. The group's DNSCalc technique — dynamically computing the C2 port from the arithmetic result of IP address octets — is the most technically distinctive element and the behavioral signature that survives tool rotation.
| mitre id | technique | description |
|---|---|---|
| T1566.001 | Spear-Phishing Attachment | Consistent primary initial access vector since 2009. Weaponized PDF, Microsoft Word (.doc), and Excel attachments are delivered to targeted individuals at government ministries, media organizations, and technology firms. Lure documents are written in Traditional Chinese and reference current Taiwanese government topics, upcoming conferences, and geopolitically relevant events. Screen saver (.scr) files disguised as legitimate documents via right-to-left Unicode override (T1036.002) are also used. |
| T1566.002 | Spear-Phishing Link | Employed against the New York Times and other media targets. Phishing emails contained links directing targets to compromised servers. In at least one documented Taiwanese government campaign, phishing emails were sent from already-compromised legitimate Taiwanese government email accounts — bypassing sender reputation filtering entirely. |
| T1203 | Exploitation for Client Execution | CVE-2012-0158 (Microsoft Office ActiveX buffer overflow) is APT12's most consistently documented exploitation vector, used to deliver RIPTIDE, HIGHTIDE, THREEBYTE, and WATERSPOUT via weaponized Word documents. The "Tran Duy Linh" exploit kit built around this CVE appeared in multiple APT12 campaigns targeting Taiwan and Japan even years after the patch was available, exploiting slow enterprise patching cycles. |
| T1036.002 | Right-to-Left Override | ETUMBOT delivery chains used a hidden Unicode right-to-left override character in filenames to reverse the display order of the extension — causing a .scr binary to appear as a .xls spreadsheet to the victim. A simple but effective social engineering aid that bypasses file-extension-based user warnings. |
| T1568.003 | DNS Calculation (Dynamic Resolution) | APT12's signature C2 evasion technique — the behavior that earned the group the DynCalc and DNSCalc aliases. Rather than hard-coding a C2 port in the malware binary, IXESHE and related tools resolve a DNS name and perform arithmetic on the resulting IP address octets (e.g., multiplying the first two octets and adding the third) to derive the communication port dynamically. This means port-based detection signatures are useless unless the algorithm itself is known, and the port changes with each C2 infrastructure rotation. |
| T1071.001 | Web Protocols (HTTP/HTTPS C2) | All documented APT12 backdoors — IXESHE, RIPTIDE, HIGHTIDE, ETUMBOT — communicate with C2 infrastructure via HTTP GET requests, blending traffic with normal web activity. Communication payloads are RC4-encrypted and Base64-encoded. RIPTIDE is proxy-aware, enabling C2 communication through corporate web proxies that would block direct connections to attacker infrastructure. |
| T1547.001 | Registry Run Keys | Backdoors achieve persistence via Windows Registry Run keys, ensuring reinstatement on system reboot. Registry-based persistence was consistently used across IXESHE, RIPTIDE, HIGHTIDE, and ETUMBOT generations — one of the few TTPs that did not change after public disclosure because it has no viable signature-free alternative. |
| T1003 | OS Credential Dumping | In the New York Times intrusion, APT12 extracted username and password hashes for all Times employees from the domain controller within two weeks of initial access, then cracked them offline. This credential sweep enabled access to 53 workstations and the targeted email accounts — the primary intelligence objective of the operation. |
| T1078 | Valid Accounts | Cracked domain credentials used extensively at the Times to authenticate as legitimate users across the network. In 2014 Taiwan operations, the group used valid compromised Taiwanese government email accounts to send phishing emails — extending the use of legitimate credentials beyond internal lateral movement into supply-chain-style social engineering. |
| T1027 | Obfuscated Files or Information | IXESHE and successor tools used RC4 encryption and Base64 encoding for all C2 communications. Updated AUMLIB variants encoded the body of POST requests — the specific change made after Mandiant's 2013 NYT investigation described the plaintext POST body format, which had been a detection indicator. |
| T1041 | Exfiltration Over C2 Channel | Collected data exfiltrated through the same HTTP C2 channels used for command delivery. IXESHE supported file upload and download natively. RapidStealer was deployed as a dedicated exfiltration tool for high-volume data collection. The Times intrusion focused on targeted email exfiltration — specifically the correspondence of named journalists — rather than bulk data theft. |
| T1586.002 | Compromise Email Accounts | Compromised legitimate Taiwanese government email accounts were used as phishing launch infrastructure in 2014 campaigns, dramatically increasing the credibility and deliverability of spear-phishing messages. This represents a matured operational approach: stealing trusted sending identities rather than relying on attacker-registered domains. |
Known Campaigns
APT12's campaign history is characterized by sustained regional targeting punctuated by high-visibility incidents. The two documented retooling events — triggered by vendor publications — are as significant as any individual campaign, because they reveal the group's operational intelligence function and resilience.
Trend Micro documented APT12's foundational campaign in a 2012 white paper. From approximately 2009 onward, the group used the IXESHE backdoor in spear-phishing campaigns against East Asian governments, electronics manufacturers, and a telecommunications company. Decoy documents were written in Traditional Chinese with content related to Taiwanese government interests, including upcoming conferences. IXESHE provided full remote access: listing services, processes, and drives; creating remote shells; uploading and downloading files; executing commands; and harvesting usernames and domain information. By 2012, the group had amassed approximately 60 command-and-control servers — many in Taiwan and the United States — demonstrating a deliberate operational approach of using geographically distributed, reputable-IP infrastructure to complicate attribution and blocking.
Beginning in September 2012 — while the Times was finalizing David Barboza's investigation into the family wealth of Premier Wen Jiabao — APT12 initiated an intrusion that persisted for over four months undetected. AT&T, monitoring the Times' network, first flagged anomalous traffic patterns in October 2012 around the time the Wen story was published. The Times engaged Mandiant, who traced the attackers to China and identified them as a known APT group that had previously targeted Western organizations and U.S. military contractors. Mandiant found that the attackers spent two weeks quietly mapping the network before locating the domain controller and extracting password hashes for every employee. Cracked credentials were used to access 53 workstations; the primary targets were Barboza's email and the correspondence of Jim Yardley — the former Beijing bureau chief then serving as the Times' South Asia bureau chief in India. APT12 deployed 45 custom malware samples across those 53 machines — an unusually high ratio, and one that reflected the group's focus on maintaining persistent access against the Times' active incident response rather than broad network compromise. Only one of those 45 samples was detected by the Symantec antivirus in use at the time. The Chinese-language edition of the Times was blocked in China the day the Wen story published; the group's focus on identifying Barboza's sources indicates the intrusion served both intelligence and counter-journalism objectives.
Following the Times' January 2013 public disclosure of the breach and the publication of Mandiant's investigation findings, APT12 paused operations briefly then resumed with updated tooling that specifically defeated the detection signatures described in the published research. AUMLIB's POST body — previously sent in plaintext, which had been documented as a detection indicator — was now encoded. IXESHE's network traffic patterns were altered to evade published signatures. Updated variants appeared against new targets by May–June 2013, including economic policy organizations and Taiwanese entities. The pause was brief; the retooling was precise. FireEye's documentation of this event in the 2014 M-Trends report gave it the name that stuck: Darwin's Favorite APT Group.
Arbor Networks documented a sustained campaign using the ETUMBOT (also called RIPTIDE by FireEye) backdoor targeting organizations in Taiwan and Japan. Lure documents impersonated Taiwanese government conference materials and Japanese business correspondence. ETUMBOT used a right-to-left Unicode override character in filenames to disguise .scr executables as .xls spreadsheets. After installation, the backdoor sent an RC4 key to its C2 server and subsequently encrypted all communication — a meaningful advancement over IXESHE's plaintext traffic. All observed C2 servers responded on algorithmically calculated ports derived from resolved IP octets, consistent with APT12's DynCalc signature. Arbor Networks' June 2014 report disclosed the protocol details, encryption methods, and infrastructure patterns in granular detail — setting up Retool #2.
Within weeks of Arbor Networks' June 2014 ETUMBOT analysis, APT12 deployed HIGHTIDE — a modified variant that changed every specific detail Arbor had described: the executable drop location moved from %APPDATA%\Location\ to %TEMP%\; the image base address was changed; the HTTP User-Agent string was replaced; and the URI format of C2 GET requests was altered. FireEye observed HIGHTIDE targeting Taiwanese government ministries between August 22 and 28, 2014, with phishing emails sent from a compromised Taiwanese government account — a new operational improvement that had not been present in the RIPTIDE campaigns. FireEye assessed the HIGHTIDE deployment as a temporary bridge tool while the group developed its next-generation toolkit, which they believed emerged as the WATERSPOUT backdoor.
FireEye documented two newly observed backdoors — THREEBYTE and WATERSPOUT — in campaigns against Japan and Taiwan using the same CVE-2012-0158 delivery method as RIPTIDE and HIGHTIDE. WATERSPOUT used HTTP-based C2 channels and was assessed as a likely APT12 next-generation tool given the shared delivery infrastructure, target geography, and phishing approach. THREEBYTE had been previously observed in APT12 operations. A WATERSPOUT-using campaign targeted a Japan-based electronics company, consistent with APT12's established targeting pattern. FireEye stated it expected APT12 to continue evolving and adapting tools to stay ahead of network defenders — and the absence of subsequent major public disclosures may reflect improved operational security as much as reduced activity.
Between November 26 and December 1, 2015, APT12 conducted coordinated spear-phishing campaigns against high-technology, government services, media, and financial services organizations across Japan and Taiwan simultaneously. Each campaign delivered a malicious Microsoft Word document exploiting a then-current EPS dict copy use-after-free vulnerability, chained with the local Windows privilege escalation flaw CVE-2015-1701. Successful exploitation delivered either IRONHALO — a downloader for subsequent payload staging — or ELMER, a backdoor providing remote access and command execution. The narrow five-day window and simultaneous cross-country targeting reflect the same geopolitically correlated operational tempo that APT12 demonstrated in the 2013 retool campaigns — concentrated bursts of activity around significant diplomatic or security events in the Japan-Taiwan-China relationship. The use of a chained exploitation technique (EPS vulnerability plus privilege escalation) represents a technical evolution beyond the group's earlier reliance on CVE-2012-0158 alone.
Tools & Malware
APT12 operates a modular custom toolset that evolves in response to public disclosure. Core backdoor families provide C2, persistence, and data collection. Supporting tools handle specific functions — reconnaissance, credential harvesting, and bulk exfiltration. The DNSCalc port-calculation technique is a persistent behavioral signature that has appeared across multiple tool generations.
- IXESHE: APT12's foundational backdoor, first documented by Trend Micro in 2009. Provides a full remote access capability: listing running services, processes, and drives; terminating processes and services; downloading and uploading files; starting processes and services; retrieving usernames, machine names, and domain membership; executing arbitrary files; sleeping for specified intervals; spawning remote shells; and listing files and directories. Communicates via HTTP with RC4 encryption and Base64 encoding. C2 port derived via DynCalc arithmetic on resolved DNS IP address octets. Updated after the 2013 New York Times disclosure to alter network traffic patterns and evade published detection signatures.
- ETUMBOT / RIPTIDE: A successor backdoor documented by Arbor Networks in 2014 and cross-named RIPTIDE by FireEye. Proxy-aware — communicates through corporate web proxies, enabling C2 in environments where direct outbound connections to foreign IP addresses are blocked. Communicates via HTTP GET requests to hard-coded C2 servers with RC4 encryption. Delivered via CVE-2012-0158 Word documents with right-to-left override filename deception. Uses DynCalc port calculation.
- HIGHTIDE: A rapid response variant of RIPTIDE deployed in June 2014, weeks after Arbor Networks published a granular technical analysis of ETUMBOT. Changed the executable drop path, image base address, HTTP User-Agent string, and URI format specifically to defeat each detection method described in Arbor's report. Assessed by FireEye as a bridge tool deployed while longer-term development was underway. Used compromised Taiwanese government email accounts as sending infrastructure.
- AUMLIB: A reconnaissance and system profiling module that collects victim BIOS information, external IP address, and operating system details via HTTP POST to C2. Updated after the 2013 NYT breach disclosure to encode the POST body — the plaintext format had been a documented detection indicator — replacing it with encoded output that evaded published signatures.
- WATERSPOUT: A newly observed backdoor documented by FireEye in September 2014 targeting a Japan-based electronics company. HTTP-based C2. Not definitively confirmed as APT12 tooling but assessed as highly likely given shared delivery infrastructure, CVE-2012-0158 exploitation, and consistent geographic targeting. Assessed as the next-generation toolkit that emerged after HIGHTIDE's bridge period.
- THREEBYTE: A backdoor that exploits CVE-2012-0158 for delivery, previously used in documented APT12 campaigns. Observed in a new campaign against Japan and Taiwan in 2014 alongside WATERSPOUT-linked activity.
- RapidStealer: A dedicated data collection and exfiltration tool deployed for high-volume theft, complementing the built-in file transfer capabilities of IXESHE and RIPTIDE. Operates stealthily and forwards collected data without interactive user interaction, suited to large-scale document harvesting campaigns.
- IHEATE: A U.S.-targeted variant of IXESHE with modified command-and-control encryption. Sample metadata ("EMC112") suggests a specific compilation timestamp and campaign targeting pattern. Represents APT12's adaptation for Western targets beyond the group's primary East Asian operational theater.
- IRONHALO: A downloader tool documented in the November–December 2015 Japan and Taiwan campaigns. Delivered via chained exploitation (EPS vulnerability + CVE-2015-1701) and used to stage subsequent payload retrieval from C2, providing separation between the initial exploit delivery and the final persistent backdoor installation.
- ELMER: A backdoor documented in the same 2015 multi-country campaign alongside IRONHALO, providing remote command execution and persistent access. Represents a newer-generation implant distinct from the IXESHE/RIPTIDE lineage, indicating continued parallel toolset development.
- CLUBSEAT / GROOVY: Additional supporting tools documented in the APT12 / Hexagon Typhoon intrusion set by community researchers, consistent with the group's modular toolkit approach. CLUBSEAT and GROOVY function within the broader operational support layer alongside RapidStealer and AUMLIB.
Indicators of Compromise
APT12's documented rapid retooling after public disclosure makes specific static IOCs less durable than for groups that change tools infrequently. The most reliable detection indicators are behavioral — particularly the DNSCalc port calculation pattern, which persists across tool generations.
APT12 is assessed as active and reads vendor threat intelligence. Any specific domain, hash, or infrastructure indicator published here or elsewhere has a documented history of being rendered obsolete within weeks of publication. Prioritize behavioral detection over static signature matching for this group.
Mitigation & Defense
APT12 is assessed as currently active, with no indications of dissolution or operational pause. The group continues to target Taiwanese and Japanese government and technology organizations. Given its documented practice of reading vendor threat intelligence to update its tools, defenders must prioritize technique-based and behavioral detection over static indicators.
- Behavioral C2 Detection: The DNSCalc port calculation technique is APT12's most durable behavioral fingerprint and the hardest to change without re-architecting the entire C2 framework. Implement network monitoring that detects anomalous outbound connections to non-standard ports — particularly ports dynamically derived from arithmetic on recently resolved DNS IPs. Snort and Suricata rules targeting IXESHE and RIPTIDE HTTP header patterns are available and should be deployed alongside anomaly-based detection, since specific signatures will eventually be defeated.
- Email Security and Attachment Sandboxing: Spear-phishing has been APT12's exclusive initial access method. Deploy email sandboxing with behavioral detonation for all Office documents, PDFs, and screen saver (.scr) files. Enable Unicode character inspection in attachment filenames to detect right-to-left override characters. Treat any email attachment containing a Unicode bidirectional override character as high-risk regardless of the apparent file extension. Block .scr attachments outright unless a specific business need exists.
- CVE-2012-0158 Patching: This decade-old Microsoft Office vulnerability continues to appear in APT12's delivery chains because enterprise patching remains incomplete. Verify that MS12-027 is applied across all Windows systems and all versions of Microsoft Office in the environment. Run authenticated vulnerability scans to confirm — not just assume — patch status across legacy systems.
- Privileged Credential Protection: The Times intrusion demonstrated how quickly APT12 moves from initial foothold to domain controller access and full credential harvesting. Implement Privileged Access Workstations (PAWs) for administrative accounts, enable Windows Credential Guard on supported systems, enforce multi-factor authentication on all remote access, and monitor for anomalous LSASS access using EDR behavioral rules.
- Domain Controller Monitoring: APT12 extracted the entire Times employee password hash database from the domain controller. Monitor for bulk LDAP queries, anomalous Kerberos ticket requests, and unusual access to NTDS.dit or domain controller event logs. Alert on any account — particularly service accounts — accessing the domain controller from a non-administrative workstation.
- Journalist and Executive Targeting Awareness: APT12's targeting of specific individuals — bureau chiefs, investigative reporters, policy analysts — makes people-focused security measures essential. Brief high-value individuals on spear-phishing recognition, implement targeted phishing simulations, and apply additional email security controls to accounts of personnel involved in politically sensitive reporting or policy work relevant to Taiwan, Japan, or China relations.
- Threat-Informed Defense Model: APT12's retooling behavior means that publishing specific IOCs without a behavioral detection layer creates a false sense of security. Defenders should map their detection capabilities to the MITRE ATT&CK techniques documented for G0005 — T1568.003, T1566, T1547.001, T1071.001, T1003, T1027 — and verify that behavioral rules for each are functional in their environment regardless of whether the specific tool variant has been seen before.
APT12's breach of the New York Times established a principle that defenders in media, civil society, and policy sectors must internalize: journalism that embarrasses CCP leadership is treated as a national security matter by PRC-linked threat actors, making Western media organizations legitimate and active espionage targets — not collateral damage. Any organization whose reporting, research, or advocacy intersects with Taiwan, Hong Kong, Tibet, Xinjiang, or CCP leadership should treat itself as within APT12's target set. The group's access to geopolitically correlated tasking suggests operations are ongoing — the absence of recent public attribution reflects improved operational security and the absence of another high-visibility incident like the Times breach, not a cessation of activity.
Sources & Further Reading
Attribution and references used to build this profile.
- MITRE ATT&CK — Group G0005: APT12
- Mandiant (Google Cloud) — Darwin's Favorite APT Group (September 3, 2014)
- Threatpost — Inside the Targeted Attack on the New York Times (January 31, 2013)
- Wikipedia — Numbered Panda (source-cited reference)
- Hedgehog Security — APT12: The PRC's Cyber Operative
- Malpedia — APT12 Actor Profile
- MITRE ATT&CK — T1568.003: DNS Calculation
- Council on Foreign Relations — Cyber Operations Tracker: APT 12
- Microsoft MSTIC — Threat Actor Naming Mapping (Hexagon Typhoon / HYDROGEN / HORDE = APT12)