News

The executable, as observed in prior Mustang Panda attacks, leverages DLL side-loading to launch a malicious DLL dubbed ...
China hackers targeting Russia have secretly launched cyberattacks on Russian defense systems since the Ukraine war began, despite public claims of a strong alliance. Cybersecurity experts say Chinese ...
Since the war in Ukraine began, analysts have monitored a series of intrusions aimed at stealing information about weaponry ...
China-aligned groups like Mustang Panda and DigitalRecyclers continued their espionage campaigns targeting the EU government and maritime sectors.
“Given the features of the malware, and the use of command-line arguments, Mustang Panda likely uses StarProxy as a post-compromise tool to access systems that are not reachable directly over the ...
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach ...
The Mustang Panda malware also implements an exception handler that executes when ESET applications are not found. In these instances, the malicious code is directly injected into waitfor.exe using ...
Mustang Panda has been active since at least 2014, the recently unveiled FBI affidavit said. The group targeted government and private business organizations based in the US, Europe, and Asia ...
The FBI’s recent operation successfully removed PlugX malware from thousands of U.S. computers. Credit: J / CC BY 2.0 The FBI, with court approval, has remotely removed PlugX malware from 4,258 ...
The group, Mustang Panda, used malware called PlugX to access thousands of computers worldwide, according to the Justice ...
Mustang Panda is a PRC-funded hacker group responsible for spreading the PlugX malware. Since 2014, the organization used the malware to access thousands of computer systems.