WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships FBI FLASH: Intrusion Activities of China-based Cyber Actors Associated with APT 41
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

FBI FLASH: Intrusion Activities of China-based Cyber Actors Associated with APT 41

Author: Charles Egli

Created: Thursday, September 17, 2020 - 17:51

Categories: Cybersecurity

The FBI has published a (TLP:WHITE) FLASH message providing technical details of cyber actors based in China, associated with APT 41, who have been indicted for computer intrusions affecting more than 100 victim companies in the U.S. and abroad. Some of the targeted victims were in the “government” industry. The FLASH describes how the actors used a wide range of tactics to gain initial access, including spear-phishing and by exploiting publicly identified security vulnerabilities, including those involving VPNs. The FLASH also provides lists of recommended mitigation measures, categorized by patch and vulnerability management, credential protection, and network hygiene and monitoring. It concludes by encourages recipients of the document to report information concerning suspicious or criminal activity to their local FBI field office of the FBI’s 24/7 Cyber Watch (CyWatch), at (855)292-3937 or Cy*****@*bi.gov.

Attached Files:

FLASH-AC-000133-TT-APT41

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar