Threat Group Cards: A Threat Actor Encyclopedia Archived: 2026-04-05 22:39:30 UTC Home > List all groups > UNC5221, UTA0178 APT group: UNC5221, UTA0178 Names UNC5221 (Mandiant) UTA0178 (Volexity) Country China Motivation Information theft and espionage First seen 2022 Description (Mandiant) Note: This is a developing campaign under active analysis by Mandiant and Ivanti. We will continue to add more indicators, detections, and information to this blog post as needed. On January 10, 2024, Ivanti disclosed two vulnerabilities, CVE-2023-46805 and CVE-2024-21887, impacting Ivanti Connect Secure VPN (“CS”, formerly Pulse Secure) and Ivanti Policy Secure (“PS”) appliances. Successful exploitation could result in authentication bypass and command injection, leading to further downstream compromise of a victim network. Mandiant has identified zero-day exploitation of these vulnerabilities in the wild beginning as early as December 2023 by a suspected espionage threat actor, currently being tracked as UNC5221. Observed Countries: Worlwide. Tools used BRICKSTORM, GLASSTOKEN, LIGHTWIRE, PySoxy, THINSPOOL, WARPWIRE, WIREFIRE, ZIPLINE. Operations performed 2022 NVISO analyzes BRICKSTORM espionage backdoor Mar 2025 Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) https://apt.etda.or.th/cgi-bin/showcard.cgi?u=41ed823b-f62c-439a-9304-f9016f8dcef1 Page 1 of 2 Information Last change to this card: 21 April 2025 Download this actor card in PDF or JSON format Source: https://apt.etda.or.th/cgi-bin/showcard.cgi?u=41ed823b-f62c-439a-9304-f9016f8dcef1 https://apt.etda.or.th/cgi-bin/showcard.cgi?u=41ed823b-f62c-439a-9304-f9016f8dcef1 Page 2 of 2