• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
chinese hackers targeting european entities with new mqsttang backdoor

Chinese Hackers Targeting European Entities with New MQsTTang Backdoor

You are here: Home / General Cyber Security News / Chinese Hackers Targeting European Entities with New MQsTTang Backdoor
March 3, 2023

The China-aligned Mustang Panda actor has been observed utilizing a hitherto unseen customized backdoor identified as MQsTTang as part of an ongoing social engineering campaign that commenced in January 2023.

“Compared with most of the group’s malware, MQsTTang doesn’t appear to be to be based mostly on current households or publicly out there projects,” ESET researcher Alexandre Côté Cyr explained in a new report.

Attack chains orchestrated by the team have stepped up focusing on of European entities in the wake of Russia’s total-scale invasion of Ukraine past 12 months. The victimology of the existing action is unclear, but the Slovak cybersecurity business reported the decoy filenames are in line with the group’s previous campaigns that goal European political businesses.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


That mentioned, ESET also observed attacks versus unfamiliar entities in Bulgaria and Australia, as well as a governmental establishment in Taiwan, indicating aim on Europe and Asia.

Mustang Panda has a background of utilizing a distant accessibility trojan dubbed PlugX for achieving its targets, although current intrusions have viewed the group increasing its malware arsenal to incorporate tailor made applications like TONEINS, TONESHELL, and PUBLOAD.

MQsTTang Backdoor

In December 2022, Avast disclosed another set of attacks aimed at govt companies and political NGOs in Myanmar that led to the exfiltration of delicate knowledge, such as email dumps, documents, courtroom hearings, interrogation reports, and conference transcripts, working with a PlugX variant called Hodur and a Google Push uploader utility.

What is actually far more, an FTP server connected to the menace actor has been discovered to host a range of beforehand undocumented tools employed to distribute malware to contaminated gadgets, which include a Go-dependent trojan referred to as JSX and a sophisticated backdoor referred to as HT3.

The growth of MQsTTang factors to a continuation of that pattern, even if it is really a “barebones” solitary-stage backdoor sans any obfuscation tactics that permit for executing arbitrary instructions been given from a remote server.

v

Even so, an uncommon component of the implant is the use of an IoT messaging protocol known as MQTT for command-and-command (C2) communications, which is attained applying an open resource library called QMQTT, an MQTT client for the Qt cross-system application framework.

The first intrusion vector for the attacks is spear-phishing, with MQTT distributed via RAR archives made up of a solitary executable that options filenames with diplomatic themes (e.g., “PDF_Passport and CVs of diplomatic associates from Tokyo of JAPAN.eXE”).

“This new MQsTTang backdoor presents a kind of remote shell devoid of any of the bells and whistles linked with the group’s other malware households,” Côté Cyr reported. “Nonetheless, it displays that Mustang Panda is discovering new technology stacks for its instruments.”

Discovered this write-up interesting? Follow us on Twitter  and LinkedIn to go through more exceptional articles we submit.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Experts Warn of “SMS Pumping” Fraud Epidemic
Next Post: New Flaws in TPM 2.0 Library Pose Threat to Billions of IoT and Enterprises Devices new flaws in tpm 2.0 library pose threat to billions»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.