Mustang Panda | |
Other Names | BASIN, BRONZE PRESIDENT, Earth Preta, HoneyMyte, LuminousMoth, Polaris, Red Lich, Stately Taurus, TA416, TANTALUM, TEMP.HEX, Twill Typhoon, Camaro Dragon, RedDelta |
Location | China |
Date of Initial Activity | 2011 |
Suspected Attribution | Chinese state-sponsored espionage group |
Motivation | Cyber-espionage driven by a combination of political, economic, and strategic motivations aimed at bolstering China’s national interests on the global stage. Cyberwarfare |
Associated Tools | Cobalt Strike |
Systems Targeted | Windows |
Active | Yes |
Overview
Common targets
Government Entities, Non-Governmental Organizations (NGOs), Religious Organizations, Think Tanks, Academic Institutions, Private Sector, Political Entities in the United States, Philippines Mongolia, Myanmar, Pakistan, Bangladesh, India, Japan, South Korea, Vietnam.
Attack Vectors
Mustang Panda employs a variety of attack vectors to compromise their targets, focusing primarily on spear-phishing emails that deliver malicious attachments or links.
How they operate
MITRE ATT&CK Techniques
T1583.001 – Acquire Infrastructure: Domains T1071.001 – Application Layer Protocol: Web Protocols T1560.001 – Archive Collected Data: Archive via Utility T1560.003 – Archive Collected Data: Archive via Custom Method T1119 – Automated Collection T1547.001 – Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder T1059.001 – Command and Scripting Interpreter: PowerShell T1059.003 – Command and Scripting Interpreter: Windows Command Shell T1059.005 – Command and Scripting Interpreter: Visual Basic T1074.001 – Data Staged: Local Data Staging T1573.001 – Encrypted Channel: Symmetric Cryptography T1585.002 – Establish Accounts: Email Accounts T1546.003 – Event Triggered Execution: Windows Management Instrumentation Event Subscription T1052.001 – Exfiltration Over Physical Medium: Exfiltration over USB T1203 – Exploitation for Client Execution T1083 – File and Directory Discovery T1564.001 – Hide Artifacts: Hidden Files and Directories T1574.002 – Hijack Execution Flow: DLL Side-Loading T1070.004 – Indicator Removal: File Deletion T1105 – Ingress Tool Transfer T1036.005 – Masquerading: Match Legitimate Name or Location T1027.001 – Obfuscated Files or Information: Binary Padding T1003.003 – OS Credential Dumping: NTDS T1566.001 – Phishing: Spearphishing Attachment T1598.003 – Phishing for Information: Spearphishing Link T1057 – Process Discovery T1219 – Remote Access Software T1091 – Replication Through Removable Media T1053.005 – Scheduled Task/Job: Scheduled Task T1518 – Software Discovery T1608.001 – Stage Capabilities: Upload Malware T1218.004 – System Binary Proxy Execution: InstallUtil T1218.005 – System Binary Proxy Execution: Mshta T1082 – System Information Discovery T1016 – System Network Configuration Discovery T1049 – System Network Connections Discovery T1204.001 – User Execution: Malicious Link T1204.002 – User Execution: Malicious File T1102 – Web Service T1047 – Windows Management InstrumentationSignificant Attacks and Campaigns
- CSIRT-CTI has identified two campaigns exhibiting strong indications of being connected to Stately Taurus (alias Bronze President, Camaro Dragon, Earth Preta, Mustang Panda, Red Delta and Luminous Moth), both assessed to have targeted the Myanmar Ministry of Defence and Foreign Affairs. (January 2024)
- An advanced persistent threat (APT) group suspected with moderate-high confidence to be Stately Taurus engaged in a number of cyberespionage intrusions targeting a government in Southeast Asia. This group is also known by several aliases, including Mustang Panda, BRONZE PRESIDENT, TA416, RedDelta and Earth Preta. (September 2023)
References
- What Is Mustang Panda Malware?
- Mustang Panda
- MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT
- Panda Goes Full Global
- Earth Preta Spear-Phishing Governments Worldwide
- Chinese APT Bronze President Mounts Spy Campaign on Russian Military
- Mustang Panda APT Targets Europe with Plugx Malware
- Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims
- Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA