Fbi Removes Plugx Malware From 4200 Us Computers In Prc Linked Cyber Operation
Thumbnail
The U.S. Department of Justice and FBI successfully removed PlugX malware from over 4,200 computers in a coordinated operation targeting a hacking group linked to the People’s Republic of China. This operation highlights the importance of international collaboration in combating cyber threats. Affected: U.S. businesses, European and Asian governments, Chinese dissident groups

Keypoints :

  • The DOJ and FBI conducted a multi-month operation to remove PlugX malware.
  • PlugX is a remote access tool (RAT) used by hackers to control infected systems.
  • The hacking group “Mustang Panda” is linked to the People’s Republic of China.
  • Victims included U.S. businesses and various government entities worldwide.
  • The operation involved international partners, including French law enforcement and Sekoia.io.
  • Approximately 4,258 computers were cleaned of PlugX malware.
  • The operation emphasizes the need for proactive cybersecurity measures.
  • Victims are advised to update antivirus software and apply security patches.

MITRE Techniques :

  • TA0001 – Initial Access: Exploitation of vulnerabilities to gain access to victim systems.
  • TA0002 – Execution: Execution of PlugX malware on infected systems.
  • TA0003 – Persistence: Establishing persistence through PlugX to maintain access.
  • TA0004 – Privilege Escalation: Gaining elevated privileges on compromised systems.
  • TA0005 – Defense Evasion: Techniques used to avoid detection while operating on infected systems.
  • TA0006 – Credential Access: Stealing credentials from infected systems.
  • TA0007 – Discovery: Gathering information about the infected environment.
  • TA0008 – Lateral Movement: Moving within the network to access additional systems.
  • TA0009 – Collection: Collecting sensitive information from victim systems.
  • TA0011 – Exfiltration: Exfiltration of data from compromised systems.

Full Research: https://thecyberexpress.com/plugx-malware-removed/

Views: 0