Chinese hackers use new data theft malware in govt attacks

Share:

New attacks attributed to China-based cyber espionage group Mustang Panda show that the threat actor switched to new strategies and malware called FDMTP and PTSOCKET to download payloads and steal information from breached networks.

Researchers found that the hackers are using a variant of the HIUPAN worm to deliver the PUBLOAD malware stager through removable drives on the network.

Mustang Panda, (also known as HoneyMyte/Broze President/Earth Preta/Polaris/Stately Taurus) is a Chinese state-backed hacker group that focuses on cyberespionage operations against government and non-government entities mostly in Asia-Pacific, but organizations in other regions are also within its target scope.

Worm-based attack chain

Mustang Panda typically uses spear-phishing emails as the initial access vector but in a report published today, researchers at cybersecurity company Trend Micro say that new attacks from the threat actor spread PUBLOAD on the network through removable drives infected with a variant of the HIUPAN worm.

HIUPAN infection and spread
HIUPAN infection and spread
Source: Trend Micro

HIUPAN hides its presence by moving all its files into a hidden directory and leaving only a seemingly legitimate file (“USBConfig.exe”) visible on the drive to trick the user into executing it.

PUBLOAD is the main control tool in the attacks. It is executed on the system through DLL side-loading, establishes persistence by modifying the Windows Registry, and then executes reconnaissance-specific commands to map the network.

Apart from PUBLOAD, the threat actor used a new piece of malware named FDMTP, which acts as a secondary control tool. The researchers say that FDMTP is embedded in the data section of a DLL and it can also be deployed through DLL-sideloading.

According to the researchers, data collection in more recent Mustang Panda attacks is done in RAR archives and targets .DOC, .DOCX, .XLS, .XLSX, .PDF, .PPT, and .PPTX files from specified cutoff dates.

The threat actor exfiltrates the information through PUBLOAD using the cURL tool. However, an alternative exists in the custom PTSOCKET file transfer tool, an implemented based on TouchSocket over DMTP.

Spear-phishing campaign in June

In June, researchers observed a “fast-paced spear-phishing campaign” from Mustang Panda to deliver the DOWNBAIT downloader that retrieved a decoy document as well as the PULLBAIT malware, which is executed in memory.

Next, the attacker fetches and execute the first-stage backdoor called CBROVER that is digitally signed to avoid triggering the alarm.

Mustang Panda was observed using PLUGX to introduce other tools like ‘FILESAC,’ a tool that collects document files like .DOC, .XLS, .PDF, .DWG, .PPTX, .DOCX, and exfiltrates them.

Trend Micro notes there is another exfiltration method likely involving the abuse of Microsoft OneDrive, but the researchers couldn’t find the tool used for the task. The threat group has been seen abusing Google Drive previously to introduce malware onto government networks.

Overview of the spear-phishing infection chain
Overview of the spear-phishing infection chain
Source: Trend Micro

Trend Micro researchers say that Mustang Panda, which the company tracks as Earth Preta, has made significant strides in “malware deployment and strategies, particularly in their campaigns targeting government entities” (e.g. military, police, foreign affair agencies, welfare, the executive branch, and education in the APAC region).

They note that the threat actor continues to be highly active in the area and the new tactics indicate that it is focusing on “highly targeted and time-sensitive operations.”

A complete list of indicators of compromise (IoCs) associated with Mustang Panda’s latest campaigns is available here.

Bill Toulas

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
1:22 pm, Jun 22, 2025
weather icon 25°C
L: 24° | H: 26°
scattered clouds
Humidity: 49 %
Pressure: 1013 mb
Wind: 15 mph WSW
Wind Gust: 19 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 40%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
24° | 26°°C 0 mm 0% 17 mph 64 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
15° | 23°°C 0.2 mm 20% 15 mph 81 % 1016 mb 0 mm/h
Tue Jun 24 10:00 pm
weather icon
14° | 26°°C 0 mm 0% 16 mph 77 % 1015 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
16° | 27°°C 0 mm 0% 9 mph 86 % 1013 mb 0 mm/h
Thu Jun 26 10:00 pm
weather icon
17° | 24°°C 1 mm 100% 15 mph 95 % 1018 mb 0 mm/h
Today 4:00 pm
weather icon
21° | 24°°C 0 mm 0% 17 mph 47 % 1013 mb 0 mm/h
Today 7:00 pm
weather icon
21° | 22°°C 0 mm 0% 13 mph 54 % 1012 mb 0 mm/h
Today 10:00 pm
weather icon
16° | 16°°C 0 mm 0% 10 mph 64 % 1012 mb 0 mm/h
Tomorrow 1:00 am
weather icon
16° | 16°°C 0 mm 0% 13 mph 76 % 1011 mb 0 mm/h
Tomorrow 4:00 am
weather icon
16° | 16°°C 0.2 mm 20% 13 mph 81 % 1011 mb 0 mm/h
Tomorrow 7:00 am
weather icon
15° | 15°°C 0.2 mm 20% 13 mph 60 % 1013 mb 0 mm/h
Tomorrow 10:00 am
weather icon
17° | 17°°C 0 mm 0% 13 mph 46 % 1014 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
21° | 21°°C 0 mm 0% 12 mph 32 % 1015 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€89,150.11
-1.15%
Ethereum(ETH)
€1,976.75
-6.75%
Tether(USDT)
€0.87
0.02%
XRP(XRP)
€1.75
-5.46%
Solana(SOL)
€115.89
-6.07%
USDC(USDC)
€0.87
0.00%
Dogecoin(DOGE)
€0.135155
-4.58%
Shiba Inu(SHIB)
€0.000010
-5.08%
Pepe(PEPE)
€0.000008
-8.70%
Peanut the Squirrel(PNUT)
€0.218233
13.10%
Scroll to Top