Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New China-linked hacker group attacks government with stealth malware
Identity

New China-linked hacker group attacks government with stealth malware

userBy userSeptember 30, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 30, 2025Ravi LakshmananCyber ​​Spy/Malware

China-linked hacker group

Governments and telecommunications organizations in Africa, the Middle East and Asia have emerged for the past two and a half years as targets of previously undocumented Chinese Alliance actors, known as the Phantom Taurus.

“The main areas of focus for the Phantom Taurus include foreign affairs, embassies, geopolitical events and ministries of military operations,” said Rior Rochberger, a researcher of Palo Alto Networks Unit 42. “The group’s main objective is espionage. The attacks demonstrate stealth, persistence and the ability to quickly adapt tactics, techniques and procedures (TTPS).”

It is worth pointing out that the Hacking Group was first detailed in June 2023 by a cybersecurity company based on Moniker CL-STA-0043. In May last year, the Threat Cluster graduated to the temporary group TGR-STA-0043, following a revelation about sustained cyberspy activities targeting government entities as part of the campaign’s codename operations diplomatic spectors since at least late 2022.

Unit 42 stated that the group’s continued observations provided sufficient evidence to enable long-term intelligence collections and categorize the main goal of obtaining sensitive data from targets of strategic interest to China both economically and geopolitical.

DFIR Retainer Service

“The group is interested in diplomatic communications, defense-related information and the operation of key government ministries,” the company said. “The timing and scope of the group’s operations are often consistent with major global events and regional security issues.”

This aspect is particularly clear, especially as other Chinese hacking groups embrace similar approaches. For example, the new enemy, tracked by the future recorded as Rednovember, is rated as having target companies in Taiwan and Panama, close to “geopolitical and military events of major strategic interests towards China.”

Phantom Taurus’ Modus Operandi stands out because it uses custom development tools and techniques that are rarely observed in threat situations. This includes Netstars called bespoke malware suites you’ve never seen before. Developed with .NET, this program is designed to target Internet Information Services (IIS) web servers.

That said, the hacking crew relies on shared operations infrastructure previously adopted by groups such as AT27 (aka Iron Taurus), Apt41 (aka Sphchy Taurus or Winnti), and Mustang Panda (aka Stately Taurus). Conversely, the infrastructure components used by threat actors are not detected in operations carried out by others, indicating some kind of “operational compartmentalization” within the shared ecosystem.

The exact initial access vector is not clear, but previous intrusions have weaponized vulnerable on-premises Internet Information Services (IIS) and Microsoft Exchange servers, abusing flaws like Proxylogon and ProxyShell to permeate the target network.

“So far, we’ve seen them exploit known vulnerabilities in IIS and Microsoft Exchange servers (such as Proxylogon and Proxyshell), but that doesn’t mean they won’t change in the future.” “This group is extremely resourceful and motivated. They’ll find a way in some way.”

Another important aspect of the attack is the shift from collecting emails to direct targeting of the database, using batch scripts that allow you to connect to a SQL Server database, export the results in the form of a CSV file, and terminate the connection. The script is run using the Windows Management Instrumentation (WMI) infrastructure.

Unit 42 said that threat actors will use this method to systematically search for documents and information of interest related to certain countries such as Afghanistan and Pakistan.

CIS Build Kit

The recent attack installed by Phantom Taurus also utilizes netstars, consisting of three web-based backdoors, each performing certain functions while maintaining access to a compromised IIS environment –

Iiservercore is a useless modular backdoor loaded by an ASPX web shell that supports in-memory execution of command line arguments, arbitrary commands, and payload memory execution, sending the results to the encrypted Command and Control (C2) Communication Channel Assembly Excerpt V1. V1 is also equipped with the ability to bypass the anti-malware scan interface (AMSI) and Windows event trace (ETW).

“The Netstar malware suite demonstrates a deep understanding of Phantom Taurus’s advanced evasion technology and .NET architecture. “IISERVERCORE also supports a command called ChangElastModified, which suggests that malware has an active time stomp feature designed to confuse security analysts and digital forensic tools.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleVenmo and PayPal users can finally send money to each other
Next Article James Webb’s telescope spies on a “far” d star with fluorescent gas in the outer solar system
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Eightfold Co-Founder Raises $35M for Viven, AI Digital Twin Startup Contacts Missed Colleagues

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.