Bitter
Description
Bitter APT is a cyber espionage group known for targeting government, military, and critical infrastructure, primarily in South and Southeast Asia (Pakistan, India, Bangladesh, Myanmar, Vietnam, Thailand) for intelligence collation and sensitive data exfiltration. Active since at least 2013, Bitter is suspected to be a China-aligned nation-state threat actor. The group uses custom malware, phishing emails, and strategic web compromises for initial access.
It is believed Bitter (aka GTG-1002) was recently linked to attacks using CLAUDE which is an LLM by Anthropic Inc. However, no direct connection has been made at this time and remains unclear.
Aliases
- TA4865
- APT-C-08
- Bitter
- T-APT-17
Common Vulnerabilities and Exposures
Targeted Industries
- Energy
- Government
- Military
- NGOs
- Research Institutes
- Telecommunications
Objectives
Data Collection and Exfiltration
Known Tools Used
- AndroRAT variants
- ArtraDownloader
- BadNews
- GravityRAT (possible overlap)
- Malicious RTF/Office macros
- Mudia
- Yty Framework
- ZxxZ
Known Infection Vectors
- Fake or trojanized Android applications
- Infected attachments
- Malicious links
- Malicious Office documents
- Social-engineering impersonation
- Spear-phishing emails
References
CISA Known Exploited Vulnerabilities (KEV) Catalog
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
MITRE ATT&CK Bitter - G1002