Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

European Commission launches €605 million Africa Initiative IV

Orchid Security brings continuous identity observability to enterprise applications

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Mustang Panda Deploys Latest COOLCLIENT Backdoor to Government Cyberattacks
Identity

Mustang Panda Deploys Latest COOLCLIENT Backdoor to Government Cyberattacks

userBy userJanuary 28, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

In the 2025 cyber espionage attack, Chinese-linked threat actors were observed using the latest version of a backdoor called COOLCLIENT to facilitate comprehensive data theft from infected endpoints.

The activity was attributed to Mustang Panda (also known as Earth Preta, Fireant, HoneyMyte, Polaris, and Twill Typhoon), and the intrusions were primarily targeted at government agencies across the campaign across Myanmar, Mongolia, Malaysia, and Russia.

Revealing details of the updated malware, Kaspersky said it is being deployed as a secondary backdoor along with PlugX and LuminousMoth infections.

“COOLCLIENT was typically delivered with an encrypted loader file containing encrypted configuration data, shellcode, and next-stage DLL modules in memory,” the Russian cybersecurity firm said. “These modules relied on DLL sideloading as their primary execution method, and required a legitimate signed executable to load the malicious DLL.”

cyber security

Between 2021 and 2025, Mustang Panda allegedly utilized signed binaries of various software products for this purpose, including Bitdefender (“qutppy.exe”), VLC Media Player (renamed from “vlc.exe” to “googleupdate.exe”), Ulead PhotoImpact (“olreg.exe”), and Sangfor (“sang.exe”).

Campaigns observed in 2024 and 2025 were found to exploit legitimate software developed by Sangfor, including campaigns targeting Pakistan and Myanmar, to deliver a COOLCLIENT variant that dropped and executed a never-before-seen rootkit.

COOLCLIENT was first documented by Sophos in November 2022 in a report detailing widespread use of DLL sideloading by a China-based APT group. Subsequent Trend Micro analysis officially identified the backdoor as Mustang Panda, highlighting its file read/delete, clipboard and active window monitoring capabilities.

The malware was also used in attacks targeting multiple carriers in a single Asian country in a long-running espionage campaign that could begin in 2021, Broadcom’s Symantec and Carbon Black Threat Hunters team revealed in June 2024.

COOLCLIENT is designed to collect system and user information, such as keystrokes, clipboard contents, files, and HTTP proxy credentials, from a host’s HTTP traffic packets based on instructions sent from a command and control (C2) server over TCP. You can also set up a reverse tunnel or proxy to receive and execute additional plugins in memory.

Some of the supported plugins are listed below.

ServiceMgrS.dll, a service management plugin that monitors all services on the victim host FileMgrS.dll, a file management plugin that enumerates, creates, moves, reads, compresses, searches, or deletes files and folders RemoteShellS.dll – a remote shell plugin that spawns a “cmd.exe” process that allows operators to issue commands and capture the resulting output

Mustang Panda has also been observed deploying three different stealer programs to extract saved login credentials from Google Chrome, Microsoft Edge, and other Chromium-based browsers. In at least one case, the attacker executed a cURL command to leak a Mozilla Firefox browser cookie file (“cookies.sqlite”) to Google Drive.

These thieves were detected in attacks on government departments in Myanmar, Malaysia, and Thailand, and are suspected of being used as part of a broader post-exploitation effort.

cyber security

Additionally, this attack features the use of a known malware called TONESHELL (also known as TOnePipeShell). The malware is used with varying levels of functionality to establish persistence and drop additional payloads, including QReverse, a remote access Trojan with remote shell, file management, screenshot capture, and information gathering capabilities, and a USB worm codenamed TONEDISK.

Kaspersky Lab’s analysis of the browser credential stealer also revealed code-level similarities to the cookie stealer used by LuminousMoth, suggesting some degree of tooling sharing between the two clusters. Additionally, Mustang Panda has been observed using batch and PowerShell scripts to gather system information, conduct document theft operations, and steal browser login data.

“With features such as keylogging, clipboard monitoring, proxy credential theft, document leakage, browser credential harvesting, and large-scale file theft, HoneyMyte’s campaign appears to go far beyond traditional espionage goals such as document theft and persistence,” the company said.

“These tools mark a shift toward active monitoring of user activity, including capturing keystrokes, collecting clipboard data, and harvesting proxy credentials.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDiagnostic dilemma: Cocktail injected with liquid nitrogen causes man’s stomach to burst like a balloon
Next Article Critical flaw in vm2 Node.js allows sandbox escape and arbitrary code execution
user
  • Website

Related Posts

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

February 4, 2026

Orchid Security brings continuous identity observability to enterprise applications

February 4, 2026

How early decisions shape incident response investigations

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

European Commission launches €605 million Africa Initiative IV

Orchid Security brings continuous identity observability to enterprise applications

LanzaTech aims for Humberside as sustainable aviation fuel facility

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.