• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
experts uncover new espionage attacks by chinese 'mustang panda' hackers

Experts Uncover New Espionage Attacks by Chinese ‘Mustang Panda’ Hackers

You are here: Home / General Cyber Security News / Experts Uncover New Espionage Attacks by Chinese ‘Mustang Panda’ Hackers
May 6, 2022

The China-centered menace actor recognized as Mustang Panda has been observed refining and retooling its strategies and malware to strike entities located in Asia, the European Union, Russia, and the U.S.

“Mustang Panda is a really enthusiastic APT group relying primarily on the use of topical lures and social engineering to trick victims into infecting them selves,” Cisco Talos reported in a new report detailing the group’s evolving modus operandi.

The group is regarded to have focused a huge selection of corporations because at minimum 2012, with the actor largely relying on email-dependent social engineering to gain first access to fall PlugX, a backdoor predominantly deployed for extended-phrase entry.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Phishing messages attributed to the campaign contain destructive lures masquerading as official European Union reviews on the ongoing conflict in Ukraine or Ukrainian authorities experiences, both equally of which download malware onto compromised equipment.

Espionage Attacks by Chinese Hackers

Also noticed are phishing messages tailor-made to concentrate on several entities in the U.S. and many Asian international locations like Myanmar, Hong Kong, Japan, and Taiwan.

The conclusions observe a current report from Secureworks that the team may well have been targeting Russian government officers applying a decoy containing PlugX that disguised itself as a report on the border detachment to Blagoveshchensk.

But related attacks detected toward the close of March 2022 clearly show that the actors are updating their strategies by decreasing the distant URLs made use of to acquire diverse factors of the an infection chain.

Other than PlugX, an infection chains utilized by the APT group have associated the deployment of tailor made stagers, reverse shells, Meterpreter-based mostly shellcode, and Cobalt Strike, all of which are applied to set up distant access to their targets with the intention of conducting espionage and facts theft.

“By employing summit- and meeting-themed lures in Asia and Europe, this attacker aims to achieve as much extended-time period accessibility as possible to conduct espionage and information and facts theft,” Talos researchers reported.

Identified this write-up interesting? Observe THN on Facebook, Twitter  and LinkedIn to read extra exclusive written content we write-up.


Some sections of this write-up are sourced from:
thehackernews.com

Previous Post: «google releases android update to patch actively exploited vulnerability Google Releases Android Update to Patch Actively Exploited Vulnerability
Next Post: Microsoft, Apple and Google Team Up on Passwordless Standard Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.