Chinese APT using PlugX malware on espionage targets

Teilen:

China’s Bronze President APT is once again targeting government officials of interest to its paymasters, this time using forged diplomatic correspondence, according to the Secureworks Counter Threat Unit

Bronze President, the China-backed advanced persistent threat (APT) group that also goes by the name of Mustang Panda, has been conducting a widespread campaign against targets of interest to Chinese espionage, using documents that spoof official diplomatic notices to lure in their victims.

Observed by the Secureworks Counter Threat Unit (CTU), a series of attacks that unfolded during June and July used a PlugX malware to target the computer systems of government officials in several countries in Europe, the Middle East and South America.

“Several characteristics of this campaign indicate that it was conducted by the likely Chinese government-sponsored Bronze President threat group, including the use of PlugX, file paths and naming schemes previously used by the threat group, the presence of shellcode in executable file headers, and politically themed decoy documents that align with regions where China has interests,” the CTU team said in its write-up.

PlugX is a modular type of malware that calls back to a command and control (C2) server for tasking and, as such, is capable of downloading additional plugins to enhance its capabilities and functionality beyond mere information-gathering, making it particularly dangerous.

In the Bronze President campaign, it arrived at its targets embedded within RAR archive files. Opening this archive on a Windows system with default settings enabled displays a Windows shortcut (LNK) file masquerading as a document.

Alongside this shortcut is a hidden folder containing the malware, which is embedded eight levels deep in a series of hidden folders named with special characters. This tactic is likely a means to try to bypass email-scanning defences that may not look at the whole path when scanning content. In turn, said Secureworks, it suggests the delivery method is phishing emails, as there is no other real benefit to doing this.

To execute the PlugX malware, the user must click the LNK file, ultimately leading to the loading, decryption and execution of the PlugX payload. During this process, the decoy document – an example of which is shown below – is dropped.

decoy document

The CTU team said the politically themed documents suggested Bronze President’s activities are currently geared towards government officials in various countries of interest to China.

In the above example, a Turkish official is targeted with a notification, supposedly from the British government, of the appointment of a new ambassador (at the time of writing Dominick Chilcott remains the incumbent British ambassador in Ankara). In common with other recent Chinese campaigns, the targeting of Turkey probably reflects its strategic importance in the ongoing battle for Ukraine.

Ukraine has been a key focus for Bronze President, which has been highly active in 2022, supporting China’s intelligence-gathering agenda related to the war. In May, it was observed by Cisco Talos targeting European and Russian entities, also using PlugX, in a similar campaign that spoofed European Union reports on the conflict.

“Bronze President has demonstrated an ability to pivot quickly for new intelligence collection opportunities,” said the Secureworks team. “Organisations in geographic regions of interest to China should closely monitor this group’s activities, especially organisations associated with or operating as government agencies.”

https://www.computerweekly.com/news/252524710/Chinese-APT-using-PlugX-malware-on-espionage-targets

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
8:42 am, Mai 24, 2025
Wetter-Symbol 14°C
L: 14° | H: 15°
overcast clouds
Luftfeuchtigkeit: 89 %
Druck: 1012 mb
Wind: 9 mph SW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:56 am
Sonnenuntergang: 8:58 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
14° | 15°°C 0.24 mm 24% 14 mph 89 % 1012 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
13° | 19°°C 1 mm 100% 16 mph 92 % 1015 mb 0 mm/h
Mo. Mai 26 10:00 pm
Wetter-Symbol
10° | 16°°C 0.78 mm 78% 15 mph 78 % 1017 mb 0 mm/h
Di. Mai 27 10:00 pm
Wetter-Symbol
13° | 17°°C 1 mm 100% 15 mph 95 % 1016 mb 0 mm/h
Mi. Mai 28 10:00 pm
Wetter-Symbol
14° | 21°°C 1 mm 100% 16 mph 96 % 1019 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
14° | 16°°C 0.24 mm 24% 11 mph 89 % 1012 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
16° | 20°°C 0.06 mm 6% 13 mph 81 % 1012 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
21° | 24°°C 0 mm 0% 14 mph 67 % 1011 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 11 mph 67 % 1010 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
18° | 18°°C 0 mm 0% 11 mph 84 % 1010 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
15° | 15°°C 0.2 mm 20% 11 mph 88 % 1008 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
14° | 14°°C 1 mm 100% 16 mph 92 % 1007 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
13° | 13°°C 0.8 mm 80% 14 mph 84 % 1008 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€95,134.48
-2.32%
Ethereum(ETH)
€2,248.91
-4.06%
Fesseln(USDT)
€0.88
0.03%
XRP(XRP)
€2.06
-3.55%
Solana(SOL)
€153.86
-4.09%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.201049
-6.86%
Shiba Inu(SHIB)
€0.000012
-6.62%
Pepe(PEPE)
€0.000012
-10.34%
Peanut das Eichhörnchen(PNUT)
€0.308269
-5.81%
Nach oben scrollen