Chinese Hackers Deploy New Data Theft Malware in Government Attacks
The Chinese state-backed cyber espionage group Mustang Panda has launched a new wave of attacks using malware variants FDMTP and PTSOCKET to steal sensitive data from government networks. These attacks demonstrate the group's evolving tactics in cyber operations targeting government and non-government entities, especially in the Asia-Pacific region.
- New Malware Deployment: Mustang Panda is using two newly identified malware strains:
- FDMTP: A secondary control tool embedded in a DLL for malware delivery via DLL sideloading.
- PTSOCKET: A custom file transfer tool based on TouchSocket over DMTP for data exfiltration.
- Worm-based Attack Chain:
- The group is spreading malware using a modified variant of the HIUPAN worm, which infects removable drives and hides its presence, leaving behind only a disguised executable file, "USBConfig.exe," to trick users.
- The PUBLOAD malware stager, delivered via the worm, acts as the main control tool for network reconnaissance and data collection.
- Spear-phishing Campaigns:
- Mustang Panda uses fast-paced spear-phishing campaigns to deliver malware like DOWNBAIT and PULLBAIT through decoy documents, triggering in-memory execution of malicious code.
- Data Targeting and Exfiltration:
- Attackers focus on stealing .DOC, .XLS, .PDF, .PPT files, which are archived in RAR format.
- PUBLOAD and PTSOCKET facilitate the exfiltration process, often using tools like cURL to send the stolen data.
- Government Entities Under Attack:
- The group has specifically targeted entities such as the military, police, foreign affairs agencies, and education sectors in recent campaigns.
- Abuse of Cloud Services:
- Mustang Panda has previously abused cloud services like Google Drive and is now suspected of using Microsoft OneDrive to introduce malware into government networks.
The Mustang Panda group continues to advance its malware deployment strategies, particularly focusing on highly targeted government operations. With sophisticated methods like spear-phishing, worm-based attacks, and cloud service abuse, they remain a persistent threat in the cybersecurity landscape. Organizations must prioritize threat intelligence, vigilance, and robust security measures to mitigate these evolving threats.
- Other (42)
- Ransomware (123)
- Events and News (26)
- Features (44)
- Security (422)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)