Security scientists at ESET have noticed a new malware campaign by the APT team recognised as Evasive Panda (as perfectly as Daggerfly and Bronze Highland), relying on a custom made backdoor acknowledged as MgBot.
“To the greatest of our awareness, the backdoor has not been applied by any other team,” wrote ESET security intelligence analyst and malware researcher Facundo Muñoz in an advisory posted right now. “In this cluster of destructive activity, only the MgBot malware was noticed deployed on victimized devices, alongside with its toolkit of plugins.”
The new marketing campaign was first found out by ESET in January 2022, but further more investigation confirmed malicious activity related with the danger actor was detected as significantly back again as 2020.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
“Chinese consumers have been the target of this malicious activity, which ESET telemetry shows starting up in 2020 and continuing all through 2021,” Muñoz explained. “The vast majority of the Chinese victims are associates of an intercontinental NGO.”
Throughout its investigation, The ESET staff identified that a authentic software software element secretly downloaded MgBot backdoor installers from URLs and IP addresses though updating routinely.
“When we analyzed the chance of many approaches that could reveal how the attackers managed to provide malware by way of authentic updates, we were left with two situations: supply-chain compromise and adversary-in-the-center attacks,” Muñoz wrote.
As for MgBot, the ESET security qualified reported it is the primary Windows backdoor made use of by Evasive Panda.
“It was created in C++ with an item-oriented layout and has the abilities to converse via TCP and UDP and increase its features by using plugin modules.”
The listing of modules (DLL files) features the Kstrcs keylogger, the sebasek file stealer, the Cbmrpa clipboard logger, the pRsm audio stream capturer, the mailLFPassword and agentpwd credential stealers, the qmsdp Tencent QQ database stealer, the wcdbcrk Tencent WeChat facts stealer, and the Gmck cookies stealer.
Examine a lot more on modular malware right here: Modular “AlienFox” Toolkit Employed to Steal Cloud Support Credentials
“The the greater part of the plugins are intended to steal details from hugely well known Chinese purposes such as QQ, WeChat, QQBrowser, and Foxmail – all of them applications formulated by Tencent,” Muñoz included.
Far more information about every single of the modules is obtainable in the advisory. Its publication comes days soon after Symantec revealed a independent evaluation detailing an Evasive Panda campaign focusing on an African telecoms company.
Some parts of this write-up are sourced from:
www.infosecurity-journal.com