Threat Intelligence

APT15: Vixen Panda — China's Diplomatic Espionage Group Targeting Foreign Ministries, Embassies, and Government Networks Worldwide

> threat_actor APT15 —— origin: China (MSS) —— alias: Vixen Panda / Ke3chang —— signature: diplomatic espionage + government targeting<span class="cursor-blink">_</span>_

Hedgehog Security 6 January 2026 18 min read
apt15 vixen-panda ke3chang nickel china diplomatic government threat-intelligence cyber-espionage

The group that targets diplomats and ministries.

APT15 — also tracked as Vixen Panda, Ke3chang, Nickel, Nylon Typhoon, BackdoorDiplomacy, Playful Dragon, Royal APT, and Metushy — is a Chinese state-sponsored threat group that has been conducting cyber espionage operations since at least 2010. Unlike Chinese APT groups that cast wide nets across diverse industries, APT15 is distinguished by an exceptionally narrow and persistent focus: diplomatic institutions, foreign ministries, embassies, and government agencies that handle sensitive political and strategic communications. Their operations represent some of the longest-running diplomatic espionage campaigns documented in the threat intelligence community, with sustained targeting of the same types of institutions across more than a decade of continuous activity.

The group first came to broad public attention through Operation Ke3chang in 2013, when researchers documented a campaign targeting European foreign ministries during the G20 summit — using diplomatic-themed spear-phishing lures timed to coincide with one of the most significant annual gatherings of world leaders. This operational pattern — exploiting real-world diplomatic events to craft convincing social engineering lures — has remained a hallmark of APT15's methodology. They understand their targets intimately: the language of diplomacy, the cadence of international summits, and the types of documents that foreign ministry staff will open without hesitation. This domain expertise, combined with custom-built malware families that have evolved steadily over the years, makes APT15 one of the most effective diplomatic espionage operations attributed to any nation-state.

APT15's technical capabilities have matured significantly over their operational lifetime. From early campaigns relying on the BS2005 backdoor and basic command-and-control infrastructure, the group has progressively developed and deployed increasingly sophisticated tools — Ketrican, RoyalDNS, Okrum, Ketrum, TureDoor, and Turian — each generation incorporating lessons learned from detection and public exposure. Their willingness to develop entirely new malware families when existing tools are burned, combined with their exploitation of Exchange Server vulnerabilities (including ProxyLogon) and their targeting of VPN infrastructure, demonstrates a group that continuously adapts its tradecraft while maintaining an unwavering focus on the same strategic intelligence objectives: understanding what governments are thinking, planning, and communicating behind closed doors.


Linking APT15 to China's intelligence apparatus.

Attribute Detail
Tracked Names APT15 (Mandiant/Google), Vixen Panda (CrowdStrike), Nickel (Microsoft, legacy), Nylon Typhoon (Microsoft, current), Ke3chang (various, derived from early campaign name), Playful Dragon, Royal APT, BackdoorDiplomacy (ESET, campaign-based designation), Metushy
Country of Origin People's Republic of China — APT15's operations are assessed to serve the Chinese Ministry of State Security (MSS), China's primary civilian intelligence agency responsible for foreign intelligence collection and counterintelligence. The group's consistent focus on diplomatic targets — foreign ministries, embassies, and international organisations — aligns directly with the MSS's mandate to collect foreign political intelligence. The targeting pattern suggests tasking by elements of the MSS responsible for political intelligence rather than economic or technological espionage.
Suspected Affiliation Ministry of State Security (MSS) — assessed with moderate-to-high confidence. While specific organisational units or contractor entities have not been publicly identified with the same precision as groups like APT41 (Chengdu 404), the diplomatic targeting profile, operational security practices, and infrastructure patterns are consistent with MSS-directed operations. The group's sustained focus on foreign affairs institutions across multiple continents suggests centralised tasking aligned with China's strategic diplomatic intelligence requirements, rather than ad hoc or commercially motivated activity.
First Observed At least 2010, with the earliest documented campaigns targeting government entities in Southeast Asia and Europe. The group gained significant visibility following the Operation Ke3chang report in 2013, but infrastructure analysis and malware genealogy indicate operations were underway for several years prior. The longevity of their operations — over fifteen years of documented activity — places APT15 among the most persistent Chinese threat groups.
Primary Motivation State-directed diplomatic and government espionage — intelligence collection from foreign ministries, embassies, consulates, international organisations, and government entities worldwide. APT15's operations are focused on acquiring political intelligence: diplomatic cables, policy positions, negotiation strategies, summit briefings, and communications between government officials. This intelligence directly supports China's foreign policy decision-making by providing visibility into the positions and intentions of other governments on issues of strategic importance to Beijing.

Diplomacy and governance across every continent.

APT15's targeting is highly focused compared to many Chinese APT groups, but their geographic reach is global. Their primary interest is diplomatic and government institutions — the organisations that generate, process, and store the political intelligence that China's foreign policy apparatus requires. While they occasionally target adjacent sectors such as defence, telecommunications, and think tanks, these operations typically serve the same overarching objective: gaining access to information that illuminates the diplomatic positions, strategic intentions, and political dynamics of foreign governments. Their geographic footprint spans Europe, the Middle East, Africa, Latin America, Central Asia, and Southeast Asia — essentially any region where China has significant diplomatic or economic interests.

Sector Strategic Value Observed Targeting
Foreign Ministries & Embassies Direct access to diplomatic cables, policy positions, negotiation strategies, summit briefings, and inter-governmental communications — the highest-value intelligence for a diplomatic espionage operation APT15's primary and most consistent target. Documented campaigns against foreign ministries in Europe (multiple countries during Operation Ke3chang), Africa (Kenya, South Africa, and others via BackdoorDiplomacy), the Middle East (Iran, Saudi Arabia, Turkey), Latin America (Brazil, Chile), and Central Asia (Uzbekistan, Kyrgyzstan). Embassy networks in multiple countries have been compromised to intercept diplomatic communications.
Defence & Military Military planning documents, defence cooperation agreements, arms procurement data, and strategic assessments that inform China's own defence posture and diplomatic leverage Targeted defence ministries and military establishments in Europe and Asia. Operations focused on understanding defence cooperation agreements, military aid programmes, and strategic planning documents — particularly those relating to regions where China has territorial disputes or strategic competition.
International Organisations Policy deliberations, internal assessments, and decision-making processes of multilateral bodies that shape international norms and rules affecting China's interests Targeted international organisations involved in trade, human rights, and regional security. These organisations produce internal assessments and host negotiations on issues directly relevant to China's strategic interests, including trade policy, technology governance, and territorial disputes.
Government Agencies Domestic policy intelligence, law enforcement cooperation data, intelligence-sharing arrangements, and government decision-making processes across non-diplomatic departments Targeted a broad range of government agencies beyond foreign ministries, including interior ministries, justice departments, and regulatory bodies. Microsoft's December 2021 action identified Nickel targeting government agencies in 29 countries across Central and South America, the Caribbean, Europe, and Africa.
Telecommunications Access to communications metadata, call records, and network infrastructure enables surveillance of diplomats and government officials without directly compromising their devices Targeted telecommunications providers in Central Asia, the Middle East, and Africa — regions where China has significant Belt and Road Initiative investments and diplomatic interests. Compromising telecoms infrastructure provides a secondary collection channel for monitoring diplomatic communications.
Think Tanks & NGOs Policy research, expert analysis, and advisory reports that influence government decision-making — providing insight into the intellectual frameworks shaping foreign policy positions Targeted policy research institutions and non-governmental organisations focused on foreign policy, international relations, and security studies. These organisations often have close relationships with government officials and produce analysis that directly informs diplomatic decision-making.
Energy & Mining Intelligence on resource extraction agreements, energy policy negotiations, and natural resource governance that informs China's economic diplomacy and resource security strategy Targeted energy companies and mining operations in Africa and Central Asia, regions where China has made substantial investments through the Belt and Road Initiative. Intelligence collected likely supports China's negotiating positions in resource extraction agreements and energy partnerships.
Technology Intellectual property, technology transfer agreements, and technology governance policy data that supports China's technological development objectives Limited but documented targeting of technology companies, primarily focused on those involved in telecommunications infrastructure, encryption technologies, and cybersecurity — sectors with direct relevance to national security and diplomatic communications security.

Long-term diplomatic network persistence and collection.

APT15's defining operational characteristic is their ability to establish and maintain persistent, long-term access to diplomatic networks — often remaining undetected for years while systematically harvesting sensitive communications, policy documents, and intelligence reports. Unlike groups that smash-and-grab data in rapid campaigns, APT15 operates with the patience of a traditional intelligence service, embedding themselves deeply within target networks and establishing multiple redundant access pathways to ensure that the loss of any single implant does not terminate the operation. Their persistence is measured not in weeks or months, but in years — with some compromises believed to have been maintained for half a decade or longer before detection.

The methodology follows a consistent pattern across campaigns. Initial access is typically achieved through spear-phishing emails using diplomatic-themed lures — invitations to summits, policy briefing documents, diplomatic notes — or through exploitation of internet-facing infrastructure such as Exchange Servers and VPN gateways. Once inside the network, APT15 deploys custom backdoors (Ketrican, RoyalDNS, Okrum, or Turian depending on the campaign era) and establishes command-and-control communications that are designed to blend with normal network traffic. They then move laterally through the network, prioritising access to email servers, file shares containing policy documents, and the workstations of senior officials — the assets that contain the diplomatic intelligence they are tasked to collect.

What makes APT15 particularly dangerous is their approach to redundancy and resilience. In documented intrusions, investigators have found multiple distinct backdoors deployed across different systems within the same compromised network, each using different command-and-control channels and communication protocols. If defenders detect and remediate one implant, others remain active. APT15 also demonstrates a notable ability to regain access after partial remediation — in several cases, the group was observed re-compromising networks within days of incident response efforts, using previously established secondary access mechanisms or exploiting the same vulnerability that provided initial entry. This resilience transforms what might be a temporary intrusion into a persistent intelligence collection operation that mirrors the capabilities of a traditional embassy-based intelligence station.

APT15 — Diplomatic Network Persistence Model
Phase 1 — Diplomatic Lure & Initial Access
✓ Monitor target country's diplomatic calendar (summits, negotiations, visits)
✓ Craft spear-phishing lure matching current diplomatic event
✓ Deliver malicious document via email to foreign ministry staff
✓ Alternative: exploit internet-facing Exchange Server or VPN gateway

Phase 2 — Foothold Establishment
✓ Deploy primary backdoor (Ketrican / Okrum / Turian)
✓ Establish C2 channel blending with legitimate HTTPS traffic
✓ Deploy secondary backdoor (RoyalDNS) using DNS-based C2
✓ Create redundant persistence mechanisms across multiple systems

Phase 3 — Internal Reconnaissance & Lateral Movement
✓ Enumerate Active Directory for high-value accounts
✓ Harvest credentials using Mimikatz or custom credential dumpers
✓ Identify email servers, file shares, and senior official workstations
✓ Move laterally via pass-the-hash, RDP, or SMB

Phase 4 — Intelligence Collection
✓ Access email stores (Exchange mailboxes of ambassadors, policy staff)
✓ Exfiltrate diplomatic cables, policy briefs, summit preparation documents
✓ Monitor ongoing communications for real-time intelligence value
✓ Stage data in compressed/encrypted archives for exfiltration

Phase 5 — Long-Term Persistence & Re-Access
✓ Maintain multiple independent backdoors across the network
✓ Rotate C2 infrastructure periodically to evade detection
✓ Update malware variants when existing tools are publicly exposed
✓ Re-compromise network via secondary access if primary is remediated
✓ Sustain collection operations for months to years

Custom malware built for diplomatic targets.

Tool Type Capabilities
Ketrican Backdoor (Custom) APT15's primary custom backdoor, observed in multiple campaign waves from 2015 onward. Ketrican provides remote command execution, file upload/download, and system reconnaissance capabilities. It communicates with command-and-control servers over HTTP/HTTPS, using headers and URL patterns designed to mimic legitimate web browsing traffic. Multiple variants have been documented, with each iteration incorporating improved evasion techniques and updated encryption for C2 communications. Ketrican is considered the direct evolution of the earlier BS2005 backdoor.
BS2005 Backdoor (Custom, Legacy) The original backdoor associated with APT15's Operation Ke3chang campaigns in 2013. BS2005 is a relatively straightforward remote access tool providing command execution, file transfer, and basic system enumeration. It communicated over HTTP using custom-encoded data within POST requests. While technically unsophisticated by modern standards, BS2005 was effective in the context of the diplomatic networks it targeted, many of which had limited endpoint detection capabilities at the time. BS2005 served as the foundation from which APT15's later, more capable backdoors evolved.
RoyalDNS Backdoor (Custom, DNS-Based) A custom backdoor that uses DNS tunnelling for command-and-control communications — a technique specifically chosen to evade network monitoring in environments where HTTP/HTTPS traffic is heavily inspected. RoyalDNS encodes commands and data within DNS queries and responses, leveraging the DNS protocol's ubiquity and the fact that many organisations do not inspect DNS traffic with the same rigour as web traffic. This makes RoyalDNS particularly effective in diplomatically sensitive networks that may have enhanced web traffic monitoring but limited DNS analysis capability.
Okrum Backdoor (Custom) A sophisticated backdoor documented by ESET in 2019, observed in APT15 campaigns targeting diplomatic entities in Europe and Latin America. Okrum uses steganography to hide its payload within legitimate PNG image files — the backdoor extracts encrypted shellcode from pixel data in seemingly innocuous images. This technique complicates detection because the delivery mechanism appears to be a benign image download. Okrum provides standard backdoor capabilities including command execution, file operations, and screenshot capture, with C2 communications disguised as legitimate HTTP traffic.
Ketrum Backdoor (Custom) A hybrid backdoor that combines code elements from both Ketrican and the older Okrum implant, suggesting APT15 merges capabilities from their existing toolset when developing new variants. Ketrum was identified targeting diplomatic institutions and appears to represent APT15's approach to malware development: iterative refinement and recombination of proven components rather than building entirely new frameworks from scratch. It supports remote command execution, file management, and system reconnaissance.
TureDoor Backdoor (Custom) A backdoor associated with APT15's BackdoorDiplomacy campaigns targeting African and Middle Eastern diplomatic institutions. TureDoor provides remote access capabilities with encrypted C2 communications and has been observed deployed alongside Quarian in operations targeting foreign ministries. Its deployment in specific geographic campaigns suggests APT15 may tailor tooling choices to particular target regions or operational requirements.
Quarian Backdoor (Custom) An older custom backdoor used in APT15 campaigns predating the BackdoorDiplomacy designation. Quarian provides remote shell access, file transfer capabilities, and network proxy functionality. It was observed targeting government and diplomatic entities in the Middle East and Africa. ESET researchers identified Quarian as a predecessor to the Turian backdoor, with code similarities suggesting a direct evolutionary relationship between the two malware families.
Turian Backdoor (Custom) The successor to Quarian, documented by ESET as part of the BackdoorDiplomacy campaign cluster. Turian is a fully featured backdoor with enhanced capabilities compared to its predecessor, including improved encryption for C2 communications, better evasion of endpoint detection tools, and expanded data collection functionality. It has been observed targeting foreign ministries in Africa and the Middle East, and shares code lineage with both Quarian and elements of the broader APT15 malware ecosystem.
PlugX (Korplug) RAT (Shared Chinese Tooling) A remote access trojan shared across numerous Chinese APT groups. APT15 uses PlugX in various campaigns, leveraging its modular architecture for command execution, file management, keylogging, and network proxying. APT15's PlugX deployments typically use DLL side-loading via legitimate signed executables — a technique where a legitimate application is tricked into loading a malicious DLL — to achieve execution while evading application whitelisting controls.
Mimikatz Credential Harvesting (Open Source) The widely used credential extraction tool, employed by APT15 for post-compromise credential harvesting. APT15 uses Mimikatz to extract plaintext passwords, NTLM hashes, and Kerberos tickets from memory on compromised systems. Harvested credentials enable lateral movement within diplomatic networks and access to email servers and file shares containing sensitive diplomatic communications.
Cobalt Strike Commercial C2 Framework The commercial post-exploitation framework used by APT15 alongside their custom tooling, particularly in more recent campaigns. APT15 deploys Cobalt Strike BEACON for initial post-compromise operations, using malleable C2 profiles to blend command-and-control traffic with legitimate web communications. The use of Cobalt Strike alongside custom backdoors provides operational flexibility — Cobalt Strike for rapid capability deployment and custom tools for long-term persistent access.

Getting through the embassy gates.

Spear-Phishing with Diplomatic Lures
APT15's most prominent initial access technique involves highly targeted spear-phishing emails that exploit the language and context of diplomatic communications. Lures are meticulously crafted to reference real diplomatic events — G20 summit agendas, bilateral meeting invitations, policy briefing documents, and diplomatic communiqués. The timing is deliberate: campaigns are launched to coincide with actual diplomatic events, increasing the likelihood that foreign ministry staff will open attachments they believe are legitimate. Malicious documents typically exploit Microsoft Office vulnerabilities or use macro-enabled templates to deploy first-stage backdoors. Operation Ke3chang in 2013 exemplified this approach, using lures themed around the Syrian conflict and G20 discussions to target European foreign ministries.
Web Application Exploitation
APT15 has increasingly targeted internet-facing web applications — particularly Microsoft Exchange Servers — to gain initial access to diplomatic and government networks. Exchange Servers are a high-priority target because they host the email communications that APT15 seeks to collect. By exploiting vulnerabilities in Exchange, the group gains simultaneous access to both the server infrastructure and the email data stored within it. The group has been observed exploiting ProxyLogon (CVE-2021-26855) and related Exchange vulnerabilities to deploy web shells that provide persistent access to compromised mail servers, enabling ongoing email harvesting operations.
Vulnerability Exploitation
Beyond Exchange-specific vulnerabilities, APT15 exploits a range of known vulnerabilities in internet-facing infrastructure. Documented exploitation includes vulnerabilities in web-facing applications, content management systems, and server-side technologies used by government institutions. The group has demonstrated proficiency with ProxyLogon (CVE-2021-26855), ProxyShell, and other high-profile vulnerabilities affecting enterprise and government infrastructure. They are typically fast to adopt newly disclosed vulnerabilities that affect technologies commonly deployed in government environments, recognising that diplomatic institutions often lag behind in patching cadence.
Watering Hole Attacks
APT15 has conducted strategic web compromises — watering hole attacks — by compromising websites frequently visited by diplomatic and government personnel. These include news websites covering international affairs, diplomatic community portals, and government information resources. When visitors from targeted organisations browse the compromised site, exploit code silently delivers a first-stage payload. This technique is particularly effective against diplomatic targets, as foreign ministry staff regularly access a predictable set of international affairs and government news sources that can be identified through open-source intelligence.
VPN & Remote Access Exploitation
APT15 has exploited vulnerabilities in VPN concentrators and remote access infrastructure to gain direct entry into government networks. This vector became increasingly important during and after the COVID-19 pandemic, as diplomatic staff shifted to remote working arrangements and governments rapidly expanded their remote access infrastructure. The group has targeted VPN appliances from multiple vendors, exploiting known vulnerabilities to bypass authentication and gain direct access to internal network segments that would normally be protected from internet-facing attacks.

From summit espionage to global diplomatic targeting.

Operation Ke3chang (2013) was the campaign that first brought APT15 to public attention and established their reputation as a diplomatic espionage specialist. Documented by FireEye (now Mandiant), the campaign targeted European foreign ministries in the weeks surrounding the G20 summit in Saint Petersburg, Russia. The attackers sent spear-phishing emails to foreign ministry staff using lures themed around the Syrian civil war — a topic dominating diplomatic discussions at the time and virtually guaranteed to attract the attention of foreign policy professionals. Victims who opened the malicious attachments were infected with the BS2005 backdoor, which established persistent access to their workstations and the broader ministry networks. The campaign demonstrated remarkable operational awareness: the attackers understood precisely which topics would resonate with their targets and timed their operations to coincide with a period of intense diplomatic activity when staff would be most receptive to communications about current geopolitical events.

Between 2015 and 2018, APT15 conducted sustained campaigns against European diplomatic institutions, evolving their tooling from BS2005 to the more capable Ketrican backdoor and deploying RoyalDNS for stealthy DNS-based command-and-control. Research by NCC Group and Intezer documented ongoing APT15 operations targeting government networks in the United Kingdom and across Europe during this period. The campaigns demonstrated APT15's ability to maintain long-term access despite increased awareness and improved defensive measures. When specific malware variants were publicly documented and detection signatures were developed, APT15 responded by deploying updated versions with modified encryption, altered communication protocols, and new evasion techniques. This cat-and-mouse dynamic between APT15's tooling development and the threat intelligence community's analysis efforts would continue for years, with each public exposure driving a new iteration of the group's malware arsenal.

The BackdoorDiplomacy campaigns (2017–2021), documented extensively by ESET, revealed APT15's expansion into Africa and the Middle East. These operations targeted foreign ministries and diplomatic institutions in countries including Kenya, South Africa, Senegal, Ethiopia, Iran, Saudi Arabia, and Turkey. The campaigns deployed the Turian backdoor — an evolution of the earlier Quarian implant — alongside the TureDoor backdoor on both Windows and Linux systems. ESET's research highlighted APT15's ability to compromise both Windows and Linux environments within the same target organisation, a capability that is particularly relevant for diplomatic networks that often run mixed operating system environments. The BackdoorDiplomacy campaigns also demonstrated APT15's exploitation of Exchange Server vulnerabilities for initial access, a technique that would become even more prominent following the public disclosure of the ProxyLogon vulnerability chain in early 2021.

In December 2021, Microsoft's Digital Crimes Unit obtained a court order to seize 42 domains used by the group Microsoft tracks as Nickel (APT15). The seizure targeted command-and-control infrastructure that APT15 had been using to conduct espionage operations against government agencies, diplomatic entities, think tanks, and non-governmental organisations in 29 countries across Central and South America, the Caribbean, Europe, and Africa. Microsoft's action was significant for several reasons: it publicly confirmed the extraordinary breadth of APT15's geographic targeting, it disrupted active espionage operations against nearly thirty nations simultaneously, and it revealed the scale of infrastructure APT15 maintained to support concurrent operations across multiple continents. Microsoft noted that the group had been exploiting vulnerabilities in internet-facing systems — including Exchange Server, VPN appliances, and SharePoint — as well as using supply chain compromises to gain initial access to target networks.

APT15's African diplomatic targeting represents one of their most strategically significant operational theatres. As China has dramatically expanded its diplomatic and economic engagement with African nations through the Belt and Road Initiative and the Forum on China-Africa Cooperation, APT15 has provided the intelligence apparatus with visibility into African governments' negotiating positions, internal policy discussions, and relationships with other major powers. Compromised foreign ministries in Africa provide intelligence on bilateral negotiations with China itself — including loan agreements, infrastructure contracts, and resource extraction deals — as well as on African nations' diplomatic relationships with Western countries and international organisations. This intelligence gives Chinese negotiators a significant asymmetric advantage in bilateral discussions by providing advance knowledge of the other party's positions and red lines.

The group's Middle East campaigns have focused on gaining intelligence into the complex web of diplomatic relationships in a region of critical strategic importance to China. Targets have included foreign ministries, government agencies, and diplomatic missions in countries including Iran, Saudi Arabia, Turkey, and others. The intelligence objectives likely include understanding the dynamics of regional rivalries, monitoring multilateral negotiations on issues such as nuclear non-proliferation and energy policy, and gaining visibility into Middle Eastern governments' positions on issues affecting China's interests — including technology governance, human rights discussions, and trade policy. APT15's Middle Eastern operations demonstrate that their diplomatic espionage mission is truly global in scope, extending well beyond the European targets that characterised their earliest publicly documented campaigns.


Protecting diplomatic networks from persistent adversaries.

Defending against APT15 requires a security posture specifically tailored to the challenges of protecting diplomatic and government networks — environments that by their nature handle sensitive information, rely heavily on email communications, and often span geographically distributed embassies and consulates connected to central ministry networks. APT15's patience, redundant persistence mechanisms, and demonstrated ability to regain access after partial remediation mean that detection alone is insufficient; defenders must be prepared for thorough, methodical incident response that accounts for the likelihood of multiple independent footholds within the compromised environment.

Email Gateway Hardening
Implement advanced email security controls specifically configured to detect diplomatic-themed spear-phishing lures. Deploy sandboxing solutions that detonate attachments in isolated environments before delivery to end users. Configure email authentication protocols (SPF, DKIM, DMARC) with strict enforcement policies. Train diplomatic and foreign ministry staff to recognise social engineering attempts, with particular emphasis on lures that reference real diplomatic events, summit invitations, and policy documents — the exact themes APT15 consistently exploits.
Exchange Server Security
Given APT15's demonstrated exploitation of Exchange Server vulnerabilities (ProxyLogon, ProxyShell, and related chains), Exchange Server security is a critical defensive priority. Apply patches immediately upon release — APT15 has been observed exploiting Exchange vulnerabilities within days of disclosure. Deploy Exchange-specific monitoring to detect web shell deployment, mailbox export operations, and anomalous EWS (Exchange Web Services) access patterns. Consider migrating to cloud-hosted email services where patching and security monitoring are managed by the provider.
Diplomatic Network Segmentation
Implement strict network segmentation between embassy networks, consulate connections, and central ministry infrastructure. Segment classified and unclassified network environments with physical or strong logical separation. Restrict lateral movement paths between administrative workstations, email servers, and file shares containing sensitive documents. Apply zero-trust networking principles to ensure that compromise of a single embassy or consulate network does not provide direct access to the entire ministry infrastructure.
DNS Monitoring for RoyalDNS
Deploy comprehensive DNS monitoring and analysis capabilities specifically designed to detect DNS tunnelling — the C2 technique used by APT15's RoyalDNS backdoor. Monitor for anomalous DNS query patterns including high-entropy domain names, unusual query volumes to specific domains, and DNS TXT record queries that are disproportionate to normal traffic. Implement DNS logging at all levels including endpoint, recursive resolver, and perimeter. Consider deploying DNS security solutions that inspect DNS traffic for signs of data exfiltration or tunnelled communications.
Endpoint Detection & Response
Deploy EDR solutions across all systems within diplomatic networks, including workstations, servers, and remote access infrastructure. Configure detection rules for APT15-specific indicators: DLL side-loading techniques used by PlugX, steganographic payload delivery associated with Okrum, scheduled task persistence mechanisms, and anomalous process injection patterns. Ensure EDR coverage extends to both Windows and Linux systems, given APT15's demonstrated capability to target both platforms through the BackdoorDiplomacy campaigns.
Threat Intelligence Integration
Integrate threat intelligence feeds that track APT15 infrastructure, tooling, and campaign indicators into security monitoring platforms. Map your detection capabilities against MITRE ATT&CK techniques associated with APT15, identifying and closing coverage gaps. Conduct regular threat hunting exercises focused on APT15 TTPs — particularly looking for evidence of long-term persistence, redundant backdoors, and DNS-based C2 communications. Participate in government-specific threat intelligence sharing programmes (such as national CERT diplomatic advisories) that provide classified or restricted indicators relevant to APT15's diplomatic targeting.

APT15 within China's cyber apparatus.

APT15 operates within China's extensive state-sponsored cyber ecosystem, which encompasses dozens of threat groups affiliated with the People's Liberation Army (PLA), the Ministry of State Security (MSS), and the Ministry of Public Security (MPS). Within this ecosystem, APT15 occupies a specialist niche: they are the group most consistently associated with diplomatic and foreign affairs intelligence collection. While other Chinese APT groups occasionally target diplomatic institutions as part of broader campaigns, APT15's sustained, singular focus on foreign ministries and embassies sets them apart as the dedicated diplomatic espionage capability within China's cyber arsenal. This specialisation likely reflects specific tasking requirements from MSS elements responsible for political intelligence — the information that directly supports China's foreign policy decision-making at the highest levels.

Group Affiliation Primary Focus Relationship to APT15
APT1 (Comment Crew) PLA Unit 61398 Broad industrial espionage across 20+ industries — large-scale IP theft aligned with state economic priorities Different organisational lineage (PLA vs MSS) and different mission focus. APT1 conducted broad industrial espionage while APT15 specialises in diplomatic intelligence. APT1 represented the earlier, noisier approach to Chinese cyber operations that drew significant international attention following the 2013 Mandiant report. No shared tooling observed.
APT10 (Stone Panda) MSS (Tianjin Bureau) Managed service provider (MSP) targeting for access to downstream client networks; intellectual property theft and government espionage Both are MSS-affiliated and both target government entities, but APT10's approach is fundamentally different — compromising managed service providers to gain access to multiple victims simultaneously. APT10's government targeting tends to be broader, while APT15 focuses specifically on diplomatic and foreign affairs institutions. Some geographic targeting overlap in Southeast Asia.
APT3 (Gothic Panda) MSS (Guangdong Bureau) Technology, aerospace, and defence targeting primarily in the US and UK — intellectual property theft Both are MSS-affiliated but serve different intelligence requirements. APT3 focused primarily on technology and defence sector IP theft, while APT15 concentrates on diplomatic intelligence. APT3's operations diminished significantly after public exposure and US DOJ indictments in 2017, while APT15 has continued to operate actively.
APT31 (Zirconium) MSS (assessed) Government, political, and policy targets including election interference activities and IP theft in technology sectors The closest parallel to APT15 in terms of targeting overlap. APT31 also targets government and political entities but with a broader focus that includes political campaigns, policy think tanks, and technology companies. Both groups have been observed targeting European government institutions. There may be complementary tasking relationships, with APT15 focusing on diplomatic channels and APT31 on broader political intelligence.
Mustang Panda Assessed PLA or MSS Government, diplomatic, and NGO targeting primarily in Southeast Asia, Europe, and Mongolia — PlugX-heavy operations Significant overlap in targeting profile — both groups target diplomatic and government entities, and both extensively use PlugX. Mustang Panda's geographic focus is more concentrated on Southeast Asia and European entities connected to Southeast Asian policy. The two groups may represent parallel or complementary diplomatic intelligence collection efforts, potentially serving different tasking authorities within China's intelligence apparatus.
APT41 (Double Dragon) MSS (Chengdu 404) Dual-mandate: state espionage across healthcare, telecoms, technology and financially motivated cybercrime Fundamentally different operational model. APT41's dual mandate and broad targeting across espionage and cybercrime contrasts sharply with APT15's singular focus on diplomatic intelligence. Both are MSS-affiliated but serve different intelligence requirements. APT41's technical capabilities in supply chain attacks and malware development are more expansive, while APT15 brings deeper domain expertise in diplomatic operations.

APT15's specialist role within China's cyber ecosystem reflects a broader pattern of increasing specialisation among Chinese threat groups. In the early era of Chinese cyber operations (pre-2015), groups like APT1 conducted broad, indiscriminate campaigns across many sectors. The post-2015 restructuring of China's military and intelligence apparatus — which included the reorganisation of the PLA's cyber capabilities under the Strategic Support Force and the expansion of MSS cyber operations — led to greater division of labour, with specific groups assigned to specific intelligence collection domains. APT15's enduring focus on diplomatic targets, maintained consistently across more than fifteen years of operations, suggests they are the designated capability for a mission set that China considers permanently essential: understanding what the world's governments are thinking, planning, and communicating about issues that affect Chinese interests.


The bottom line.

APT15 is one of the most persistent and focused diplomatic espionage operations in the modern threat landscape — a group that has spent over fifteen years systematically targeting foreign ministries, embassies, and government agencies worldwide to harvest the political intelligence that supports China's foreign policy decision-making. Their operational discipline is remarkable: while other threat groups diversify their targeting across multiple sectors, APT15 has remained laser-focused on diplomatic institutions, developing deep domain expertise in the language, workflows, and vulnerabilities of the diplomatic community. From the G20-themed lures of Operation Ke3chang to the continent-spanning BackdoorDiplomacy campaigns, every operation serves the same strategic objective — understanding what governments are saying to each other behind closed doors.

The group's technical evolution mirrors their operational persistence. From the rudimentary BS2005 backdoor used in their earliest campaigns, APT15 has developed and deployed a succession of increasingly sophisticated malware families — Ketrican, RoyalDNS, Okrum, Ketrum, TureDoor, and Turian — each generation incorporating improved evasion, encryption, and operational security. Their adoption of DNS tunnelling for command-and-control, steganographic payload delivery, and exploitation of Exchange Server vulnerabilities demonstrates a group that continuously adapts its tradecraft to the defensive landscape while maintaining operational continuity. Microsoft's seizure of 42 Nickel-associated domains in 2021 confirmed the extraordinary scale of their infrastructure — supporting concurrent operations against government entities in 29 countries — and briefly disrupted their activities, but the group's history of resilience and re-tooling suggests these disruptions are temporary setbacks rather than permanent capability degradation.

For organisations in the diplomatic and government sectors, APT15 represents a clear and present threat that demands sustained defensive investment. The group's targeting is not opportunistic — it is strategically directed, persistent, and specifically tailored to exploit the unique characteristics of diplomatic networks. Foreign ministries, embassies, international organisations, and government agencies that handle politically sensitive information should assume they are potential targets and invest accordingly in email security, Exchange Server hardening, network segmentation, DNS monitoring, and endpoint detection capabilities. APT15's demonstrated ability to maintain access for years and regain access after remediation means that incident response must be thorough and ongoing, not a one-time event. The diplomatic intelligence APT15 collects has real-world consequences — it informs China's negotiating positions, shapes diplomatic strategy, and provides asymmetric advantage in international relations — making the defence of diplomatic networks not just a cybersecurity challenge but a matter of national strategic importance.


Is your diplomatic or government network prepared for persistent espionage threats?

Our penetration testing and threat intelligence services can evaluate your defences against APT15's specific tactics — diplomatic spear-phishing, Exchange Server exploitation, DNS-based command-and-control, and long-term persistence mechanisms — to identify gaps before a state-sponsored adversary exploits them.