APT PROFILE – MUSTANG PANDA – CYFIRMA

Published On : 2024-06-06

APT PROFILE – MUSTANG PANDA

Mustang Panda, also known as Bronze President, is a Chinese cyber threat actor, active since 2012. This group has launched cyberattacks against organizations worldwide, targeting foreign governments, NGOs, and other entities deemed adversaries of the Chinese Communist Party. Mustang Panda is notorious for its sophisticated spear-phishing campaigns, which utilize the target’s native language and often impersonate government services. These campaigns are crafted to exploit current international events, making the phishing emails appear highly legitimate to their intended victims.

Their primary tactic for initial penetration involves sending meticulously researched phishing emails, which closely resemble authentic documents relevant to the targeted individuals and their organizations. One of their hallmark techniques includes the use of the PlugX remote access trojan (RAT), a tool first identified by threat researchers in 2012. Since then, PlugX has been consistently employed by various Chinese cyber threat groups, including Mustang Panda, to facilitate their malicious activities.

Alias: Earth Preta, PKPLUG, Red Lich, RedDelta, Bronze President, Camaro Dragon, HoneyMyte, Luminous Moth, Stately Taurus, TA416, Temp.Hex

Motivation: Information theft and espionage

Targeted Countries

Australia, Bangladesh, Belgium, Bulgaria, China, Cyprus, Czech, Ethiopia, France, Germany, Greece, Hong Kong, Hungary, India, Indonesia, Japan, Mongolia, Myanmar, Nepal, Pakistan, Philippines, Russia, Singapore, Slovakia, South Africa, South Korea, South Sudan, Sweden, Taiwan, Thailand, Tibet, UK, USA, and Vietnam.

Mustang Panda Campaigns Tracked by CYFIRMA

Recently Exploited Vulnerabilities by Mustang Panda

  • CVE-2021-1675
  • CVE-2021-34527
  • CVE-2021-40444

Malware used by Mustang Panda

Horse Shell, WispRider, PlugX and Poison Ivy, DOPLUGS, MQsTTang, MirrorFace, Sogu

MITRE ATT&CK Techniques used by Mustang Panda

Resource DevelopmentExecutionDefense EvasionCredential AccessCommand and Control
T1585.002T1203T1036.007T1003.003T1573.001
T1608.001T1047T1027DiscoveryT1102
T1608T1059.003T1027.001T1049T1071.001
T1583.001T1053.005T1036.005T1016T1219
Initial AccessT1204.001T1564.001T1057T1105
T1566.001T1059.001T1070.004T1518
T1566.002T1204.002T1218.004T1082
T1091T1059.005T1574.002T1083
PersistencePrivilege EscalationT1218.005Lateral Movement
T1053.005T1053.005CollectionT1091
T1546.003T1546.003T1074.001Exfiltration
T1574.002T1574.002T1560.001T1052.001
T1547.001T1547.001T1119
T1560.003

Mustang Panda’s Recent Campaigns: Highlights and Trends

  • In the recently observed campaigns, the primary targets have included the Ministry of Defense and Foreign Affairs departments of various governments in the APAC region, although the scope of targeting extends beyond these entities.
  • Based on a recent campaign Mustang Panda has primarily focused on targeting government entities, particularly within the Asia-Pacific region and Europe. In the APAC region Mustang Panda activities are highly concentrated in Major Non-NATO Ally (MNNA) countries like Australia, Japan, South Korea, the Philippines, Thailand, and Taiwan as part of pre-positioning themselves to handle possible geopolitical conflicts in the region.
  • In one of the campaigns, Mustang Panda employed an executable with a screensaver (SCR) file extension for initial infection, instead of their typical choice of relying on file archive formats (ZIP, RAR, ISO) for delivery highlighting their changing tactics in delivery.
  • Mustang Panda has been known to use themed lures relating to various current-day events and issues, including the COVID-19 pandemic, international summits, and various political topics. That trend continued in the recently observed campaigns as well using high-profile summits, meetings, and natural disaster warnings.
  • In recent campaigns, Mustang Panda has potentially employed spear phishing emails as an initial access vector to target high-ranking officials within government entities that are heavily involved in international collaborations.

Source: Original Post

Views: 0