• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
experts uncover new espionage attacks by chinese 'mustang panda' hackers

Experts Uncover New Espionage Attacks by Chinese ‘Mustang Panda’ Hackers

You are here: Home / General Cyber Security News / Experts Uncover New Espionage Attacks by Chinese ‘Mustang Panda’ Hackers
May 6, 2022

The China-centered menace actor recognized as Mustang Panda has been observed refining and retooling its strategies and malware to strike entities located in Asia, the European Union, Russia, and the U.S.

“Mustang Panda is a really enthusiastic APT group relying primarily on the use of topical lures and social engineering to trick victims into infecting them selves,” Cisco Talos reported in a new report detailing the group’s evolving modus operandi.

The group is regarded to have focused a huge selection of corporations because at minimum 2012, with the actor largely relying on email-dependent social engineering to gain first access to fall PlugX, a backdoor predominantly deployed for extended-phrase entry.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Phishing messages attributed to the campaign contain destructive lures masquerading as official European Union reviews on the ongoing conflict in Ukraine or Ukrainian authorities experiences, both equally of which download malware onto compromised equipment.

Espionage Attacks by Chinese Hackers

Also noticed are phishing messages tailor-made to concentrate on several entities in the U.S. and many Asian international locations like Myanmar, Hong Kong, Japan, and Taiwan.

The conclusions observe a current report from Secureworks that the team may well have been targeting Russian government officers applying a decoy containing PlugX that disguised itself as a report on the border detachment to Blagoveshchensk.

But related attacks detected toward the close of March 2022 clearly show that the actors are updating their strategies by decreasing the distant URLs made use of to acquire diverse factors of the an infection chain.

Other than PlugX, an infection chains utilized by the APT group have associated the deployment of tailor made stagers, reverse shells, Meterpreter-based mostly shellcode, and Cobalt Strike, all of which are applied to set up distant access to their targets with the intention of conducting espionage and facts theft.

“By employing summit- and meeting-themed lures in Asia and Europe, this attacker aims to achieve as much extended-time period accessibility as possible to conduct espionage and information and facts theft,” Talos researchers reported.

Identified this write-up interesting? Observe THN on Facebook, Twitter  and LinkedIn to read extra exclusive written content we write-up.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «google releases android update to patch actively exploited vulnerability Google Releases Android Update to Patch Actively Exploited Vulnerability

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Experts Uncover New Espionage Attacks by Chinese ‘Mustang Panda’ Hackers
  • Google Releases Android Update to Patch Actively Exploited Vulnerability
  • GitHub to Enforce Two-Factor Authentication
  • Hunter Biden Laptop Repairman Sues Over Hacker Allegations
  • Illuminate Data Breach Impacts More School Districts
  • NIST Releases Updated Cybersecurity Guidance for Managing Supply Chain Risks
  • Google to Add Passwordless Authentication Support to Android and Chrome
  • Latest Cohort Announced for NCSC For Startups
  • F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems
  • Top Threats your Business Can Prevent on the DNS Level

Copyright © TheCyberSecurity.News, All Rights Reserved.