• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
china linked hackers target myanmar's top ministries with backdoor blitz

China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz

You are here: Home / General Cyber Security News / China-Linked Hackers Target Myanmar’s Top Ministries with Backdoor Blitz
January 30, 2024

The China-dependent risk actor known as Mustang Panda is suspected to have specific Myanmar’s Ministry of Defence and Foreign Affairs as element of twin strategies intended to deploy backdoors and remote accessibility trojans.

The results arrive from CSIRT-CTI, which said the routines took position in November 2023 and January 2024 after artifacts in relationship with the attacks have been uploaded to the VirusTotal platform.

“The most outstanding of these TTPs are the use of genuine application together with a binary produced by engineering agency Bernecker & Rainer (B&R) and a component of the Windows 10 enhance assistant to sideload destructive dynamic-link libraries (DLLs),” CSIRT-CTI said.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Mustang Panda, active given that at minimum 2012, is also acknowledged by the cybersecurity local community under the names BASIN, Bronze President, Camaro Dragon, Earth Preta, HoneyMyte, RedDelta, Red Lich, Stately Taurus, and TEMP.Hex.

Cybersecurity

In recent months, the adversary has been attributed to attacks concentrating on an unnamed Southeast Asian government as effectively as the Philippines to provide backdoors able of harvesting delicate information and facts.

The November 2023 an infection sequence begins with a phishing email bearing a booby-trapped ZIP archive attachment made up of a authentic executable (“Investigation of the third assembly of NDSC.exe”) that’s originally signed by B&R Industrial Automation GmbH and a DLL file (“BrMod104.dll”).

The attack requires benefit of the fact that the binary is susceptible to DLL lookup get hijacking to facet-load the rogue DLL and subsequently establish persistence and speak to with a command-and-control (C2) server and retrieve a known backdoor identified as PUBLOAD, which, in turn, acts as a tailor made loader to drop the PlugX implant.

China-Linked Hackers

“The risk actors endeavor to disguise the [C2] website traffic as Microsoft update site visitors by including the ‘Host: www.asia.microsoft.com’ and ‘User-Agent: Windows-Update-Agent’ headers,” CSIRT-CTI mentioned, mirror a May possibly 2023 campaign disclosed by Lab52.

On the other hand, the second marketing campaign noticed before this month employs an optical disc graphic (“ASEAN Notes.iso”) that contains LNK shortcuts to result in a multi-stage process that makes use of yet another bespoke loader called TONESHELL to very likely deploy PlugX from a now-inaccessible C2 server.

Cybersecurity

It is really worth noting that a comparable attack chain attributed to Mustang Panda was beforehand unearthed by EclecticIQ in February 2023 in intrusions aimed at govt and community sector companies throughout Asia and Europe.

“Adhering to the rebel attacks in northern Myanmar [in October 2023], China has expressed concern about its effect on trade routes and security close to the Myanmar-China border,” CSIRT-CTI reported.

“Stately Taurus operations are recognised to align with geopolitical interests of the Chinese govt, such as numerous cyberespionage operations versus Myanmar in the earlier.”

Found this report intriguing? Observe us on Twitter  and LinkedIn to study a lot more exclusive content material we submit.


Some parts of this posting are sourced from:
thehackernews.com

Previous Post: «493 companies share their saas security battles – get insights 493 Companies Share Their SaaS Security Battles – Get Insights in this WebinarJan 29, 2024SaaS Security / Webinar In today's digital world, security risks are more prevalent than ever, especially when it comes to Software as a Service (SaaS) applications. Did you know that an alarming 97% of companies face serious risks from unsecured SaaS applications? Moreover, about 20% of these organizations are struggling with internal data threats. These statistics aren't just numbers; they're a wake-up call. We're excited to invite you to a not-to-be-missed webinar, " Critical SaaS Security Do's and Don'ts: Insights from 493 Companies ," with Ran Senderovitz , the Chief Operating Officer of Wing Security. Ran isn't just going to talk about the problems; he's going to dive deep into the realities of SaaS security, backed by extensive research and data analysis from almost 500 companies using SaaS. Here's What This Webinar Offers: Insights Across Data, SaaS Applications, Users, and AI: Explore a comprehensive analysis of the statistics about SaaS security, di
Next Post: URGENT: Upgrade GitLab – Critical Workspace Creation Flaw Allows File Overwrite urgent: upgrade gitlab critical workspace creation flaw allows file»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.