
Understanding Chinese threat actors, TTPs and operational priorities – Part one

Prayukth KV
17. November 2025
Understanding Chinese threat actors, TTPs and operational priorities - Part one
Chinese APT groups operate with a very high degree of financial autonomy. This means that unlike their North Korean, Russian or even Iranian counterparts, Chinese APT groups do not always have to raise budgetary allocation requests to their parent ministries or departments. This should give you an idea of how unique a threat these groups have become in the last decade.
They are everywhere and their operational depth may even shock a seasoned threat researcher. However, it is the level to which these APTs are integrated with technology and the strategic goals of the Chinese state that place these groups in a separate league altogether. Involuntarily, Chinese APT groups are already playing a key role in influencing cyber defense approaches being fashioned by governments and enterprises alike. Their playbooks and tactics are being studied to develop network architectures and SOPs that can be defended.
In today’s post, we will take a high level look at Chinese state backed threat actors APT1, APT41, APT10 APT, 40, APT 31 and understand their operational strategies and priorities along with how these groups are leveraging AI to breach their targets and to make sense of a huge volume of stolen data.
This is a first article in a series that deals with Chinese state-backed threat actors.
Characteristics of Chinese APT groups
Parameter | Characteristic(s) |
Functional autonomy | Low: All groups are strictly controlled by the Ministry of State Security. The 14th Bureau responsible for technical reconnaissance is the primary designated body of control.
While the operations are broadly assigned by (or through) the 14th bureau, some reporting teams are allowed a little wriggle room to try out new tactics to breach designated targets. The functional autonomy is purely dependent on the success logged by the APT group in the past. |
Use of AI | China has been using AI for domestic surveillance since a while and a natural fallout of this was the need for automated data crunching to identify patterns of interest. China linked its domestic surveillance data to “naturalized” LLMs in the last decade and in the process, it was able to evolve by leaps and bounds in the area of AI-driven data processing.
Since the pandemic, China shifted its attention to the use of AI to run initial probes on target networks. This included automated pinging, collecting stolen credentials belonging to key employees of target enterprises, developing and manipulating malware and phishing. Since 2023, attacks, data exfiltration and data crunching have all been automated through AI.
Teams within the MSS are now experimenting with use of AI for injecting fake data packets in order to poison data sets within breached environments. |
Hierarchy | APT 1, 41 and 10 are considered relatively senior and used for high-end projects while other APT groups and sub-groups are used to open or create an opening in case of strategic targets. APT 41 is used by the MSS to also create breach chains that go upstream and downstream.
Sub-groups that can manage projects on their own may be upgraded for certain projects. Senior groups like APT 41, 1 and 10 are also tasked with mentoring sub groups as well. |
Travel | Employees of these groups are not allowed to travel to other countries except under Chinese diplomatic cover (that is a rare occurrence too). APT 1 and 10 are known to have active knowledge and information exchange programs running with their counterparts in North Korea. We have reasons to believe that North Korean threat actor Lazarus (APT 38) maintains a small presence within China.
The presence may indicate a high level of collaboration and joint targeting including payment of royalty or equivalent by Lazarus to an unknown Chinese entity. |
Targets | Broadly divided into two categories viz., commercial and strategic. The former has to do with mopping revenue and the second has to do with mopping intelligence and IP. Both are important and groups like APT 41 in fact straddle both worlds. There have been at least two instances of APT 41 monetizing stolen data internally and externally. |
Integration with Chinese foreign policy objectives | Complete. This is one area where there is zero ambiguity. From a classification perspective, nations and targets are classified as per advisories issued by the Chinese government. There is a feedback loop that is active as well, with the information stolen from targets being used to shape foreign policy interventions and methods. |
Handlers | Each group while reporting into Bureau 14 also has a MSS designated handler or manager who is primarily responsible for supervising operations, holding briefings and reporting on projects to the Central Political and Legal Affairs Commission (CPLC) of the Chinese Communist Party. There is also a reporting line that includes local MSS entities but this relationship is not very clear as of now. The handlers are accountable for the operational aspects and are personally held responsible for the threat actors attaining their targets.
Interestingly, the CPLC also has a proxy or a shadow supervisor embedded in the chain to keep an eye on the activities of the group and to validate the information shared by the handler. |
What do these groups do with stolen data? | Part of this question has already been answered. Here is the other part: · All data is first crunched and analyzed using AI algorithms, primarily with machine learning and Deep Learning. These are used to process large data sets by learning from the data. These algorithms built or developed or otherwise is able to handle unstructured data, like text and images, and structured data, like numbers and statistics. The refined data with underlines are marked for the attention of a human analyst. · Data of financial importance or containing industrial IP is marked for attention for commercial action or for negotiation with the victim · Any data of strategic importance is classified, filed and tagged for the attention of a senior analyst · Data that can be weaponized to create further breaches or maintain access to a target environment is handed over to the specific team within the specific threat actor handling that account · The residual data is sent to a common pool accessible to all groups for training · The average data cycle lasts about 28 days |

Logos: Ministry of Public Security and Ministry of State Security (source: prcleader.org)
Learn more about Chinese threat actors in our Threat Landscape Report 2025.
Access more Shieldworkz research from our research library
Wöchentlich erhalten
Ressourcen & Nachrichten
You may also like
14.11.2025
How to navigate IEC 62443 4-1 and 4-2 requirements: A guide for railway component manufacturers

Prayukth KV
13.11.2025
2026 is coming: Are your OT security controls ready?

Prayukth KV
12.11.2025
A new cornerstone for European cyber resilience: Inside ENISA's EUVD

Prayukth KV
11.11.2025
Extended recovery times are driving up the overall cost of cyberattacks.

Prayukth KV
07.11.2025
5 hard OT Cybersecurity lessons 2025 taught us (And What to Do About Them)

Prayukth KV
06.11.2025
Why NERC CIP-015-1 for Internal Network Security is a Must-Have for ICS Defense

Prayukth KV








