WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships China’s APT41 Successfully Compromises Applications Used By At Least Six U.S. State Governments
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

China’s APT41 Successfully Compromises Applications Used By At Least Six U.S. State Governments

Author: April Zupan

Created: Thursday, March 10, 2022 - 19:12

Categories: Cybersecurity

In a recent blog post by Mandiant, security researchers detail techniques used by the Chinese state-sponsored threat actor APT41 against the government networks of multiple U.S. states between the months of May 2021 and February 2022. During this period, the company observed the use of various zero day vulnerabilities, including the notorious Log4j vulnerability, to successfully compromise applications used by at least six states. One of those applications was USAHerds, which assists in tracking animal disease outbreaks, and was exploited with a unique zero day that was likely uncovered by APT41 members.

This campaign is a continued demonstration of China’s determination and maturity when targeting U.S.  government networks. In addition to the previously unknown USAHerds vulnerability (of which there is a patch available), the blog specifically notes how rapidly APT41 was able to integrate Log4j into their attacks within hours after it was publicly disclosed. Since the primary goal of APT41 was establishing a more secure foothold in U.S. state networks, their attack surface is broad. Any vulnerable external web application server, such as USAHerds, is an attractive target to obtain presence on the network and install backdoors for further activity. Read more at Mandiant.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar