Cyberwarfare

Over 200 Organizations Targeted in Chinese Cyberespionage Campaign

Chinese cyberespionage group Mustang Panda was seen targeting maritime, shipping, border control, and immigration organizations in recent attacks.

Chinese cyberespionage group Mustang Panda was seen targeting maritime, shipping, border control, and immigration organizations in recent attacks.

Chinese cyberespionage group Mustang Panda has been targeting entities related to maritime, shipping, border, and immigration as part of a recent campaign, cybersecurity firm Trend Micro reports.

Also known as Earth Preta, RedDelta, and TA416, Mustang Panda is believed to be operating on behalf of the Chinese government, and was previously seen targeting European diplomatic entities and various telecommunications companies.

Trend Micro’s analysis of several attacks observed in 2022 has revealed that the advanced persistent threat (APT) actor coordinates several subgroups in a collaborative effort to gather sensitive information from the targeted entities, and a shift in targeting towards the end of last year.

“Earth Preta has a centralized development unit that produces the implants and tools, and disseminates them to other operational groups responsible for penetration and implantation. This is evident in the Earth Preta group as it appears that multiple sub-operational groups use the same toolset with different techniques,” Trend Micro notes.

Each of the operational groups, the cybersecurity firm discovered, uses its own intrusion and privilege escalation methods, but coordination and planning appear to be lacking at the management level, as the groups might sometimes target the same entity, pursuing similar objectives.

Overall, Trend Micro identified more than 200 Mustang Panda victims, spanning across transportation, government, manufacturing, fabrication, construction, education, finance, food production, border and immigration control, and energy sectors, as well as humanitarian groups.

More than half of victims were spotted in Asia, followed by Africa, Europe and the Middle East. 

The observed targeting overlaps led to the identification of multiple sub-groups, including Groups 724, 1358, and 5171, each typically operating in different sectors and geographies.

Advertisement. Scroll to continue reading.

Group 724 uses customized USB storage devices for initial access and relies on sideloading with Adobe CEF Helper for persistence.

Group 1358, which relies on Avast’s WSC DLL for sideloading and WMI for code execution, uses the PlugX remote access tool (RAT) for data exfiltration, typically via USB drives.

Group 5171 also uses DLL sideloading with Adobe CEF Helper and employs USB-based data exfiltration. What separates it from the other groups is the infection of laptops with malicious code when traveling as part of a routine work travel, which then leads to more elaborate exploitation and lateral movement.  

“Earth Preta’s cyberespionage operations have a broad reach and have the capacity to target high value targets. The shift in collection priorities toward intelligence regarding specific areas also indicates that Earth Preta is targeting critical infrastructure and key institutions that can affect national and international relations, economies, and securities,” Trend Micro concludes.

Related: EU Organizations Warned of Chinese APT Attacks

Related: Google Suspends Chinese Shopping App Amid Security Concerns

Related: Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies

Related Content

Artificial Intelligence

China’s official Xinhua news agency said the two sides would take up issues including the technological risks of AI and global governance.

Vulnerabilities

The Chinese hacking contest Matrix Cup is offering big rewards for exploits targeting OSs, smartphones, enterprise software, browsers, and security products.

Data Breaches

The UK Ministry of Defense said a breach at a third-party payroll system exposed as many as 272,000 armed forces personnel and veterans.

ICS/OT

As cyber threats grow more sophisticated, America cannot afford complacency. The time for decisive action and enhanced cyber resilience is now.

Nation-State

MITRE has shared more details on the recent hack, including the new malware involved in the attack and a timeline of the attacker’s activities.

Network Security

While China-linked Muddling Meerkat’s operations look like DNS DDoS attacks, it seems unlikely that denial of service is their goal, at least in the...

Privacy & Compliance

History of TikTok and how it many view it as a national security threat.

ICS/OT

An analysis by Forescout shows 300,000 Chinese devices in the US, up 40% compared to the previous year, despite bans.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version