Subscribe To Our Newsletter!

Stay up to date on the top trending threats as well as the top stories in Security, Networks, Cloud, IT Ops & AIOps.

Mustang Panda – Do You KNOW This Threat Actor?

This threat actor is targeting Chinese Catholics with phishing emails.

Post by Rajarshi Mitra Nov 26, 2020

Today we are going to be focussing on a China-based threat actor – Mustang Panda. As per KNOW, our threat intel dashboard and cybersecurity news aggregator, Mustang Panda, was the third most trending threat actor over the last seven days.

mustang panda

Mustang Panda: Who are they?

Mustang Panda primarily targets non-governmental organizations (NGOs). It uses Mongolian language decoys and themes and attacks its targets with shared malware like Poison Ivy or PlugX. Their attack chain looks something like this:

  • A malicious link is sent to a Google Drive folder, cloaked using the link shortening service.
  • When clicked on, the Google Drive link fetches a zip file, containing a .Ink file cloaked as a .pdf file.
  • Upon opening the file, it redirects the user to a Windows Scripting Component (.wsc) file. This file is hosted on a malicious microblogging page.
  • The .Ink file has an embedded VBScript to retrieve the decoy PDF file and a PowerShell script from the microblogging page.
  • The PowerShell script prepares a Cobalt Strike ( payload.
  • Cobalt Strike connects with the command-and-control IP address allowing the threat actor to control the system remotely.

Why is Mustang Panda trending?

Security researchers have recently detected a resurgence of Mustang Panda activity. As of now, their target appears to be the Chinese Catholics. The hackers are targeting the group with an email phishing campaign. They have spoofed the Catholic journalists’ email headers in their phishbait.

Reactions from Twitter

#1 Security Week

#2 Virus Bulletin

#3 Threatpost

Mustang Panda references from Twitter

mustang panda

  • Total references: 210
  • Last 60 days: 29
  • Previous 7 days: 27

Mustang Panda context from KNOW

mustang panda

  • Risk rules triggered: 3 out of 48
  • Malware associated: PlugX and Poison Ivy.
  • Most recent sandbox reference: Any Run Sandbox result for 86590f80b4e1608d0367a7943468304f7eb665c9195c24996281b1a958bc1512

Stopping Mustang Panda with Threat and Attack Surface Intelligence

KnowledgeNOW from Netenrich is a first-of-its-kind FREE global threat intelligence platform.

KNOW is our threat intel and news-aggregator platform that allows you to gain the latest context of the hottest news in the global threatlandscape.

Your SecOps and IT Ops teams are continually observing your network 24*7, yet adversaries like FIN11 always manage to go through. To be fair, it’s not really their fault because current risk models cause them to chase false positives instead of tracking business-critical threats.

Netenrich’s resolution intelligence uses a combination of threat and attack surface intelligence that effectively addresses the following pain points:

  • Your organization’s attack surface is growing faster than your SecOps team and budget.
  • Threat actors can see exposed assets that lie outside your security’s purview.
  • There is a severe lack of talent and skill gaps is getting wider than ever before.
  • Attacks are more frequent and it only takes one to inflict severe, irreversible damage on your organization and business reputation.

Resolution intelligence is a powerful combination of machine and human intel that helps your SecOps to:

  • Find hidden risks in your brand.
  • Prioritize business-critical alerts.
  • Stay informed about the most trending threats.
  • Reduce alert fatigue by a considerable amount.

Do you want to know how we do all this? Well, first, you should subscribe to KNOW. Don’t worry. It’s completely free.

Alright, I will subscribe.

Next, you should know more about what resolution intel brings to the table. So, click on the button below to read up on it.

Awesome, let's do it

About the Author

Rajarshi Mitra

Rajarshi is a creative and accomplished writer who made his mark in the blockchain space before stepping into cybersecurity. When he is not working, he is busy chilling with his wife and cat.

Subscribe To Our Newsletter!

The best source of information for Security, Networks, Cloud, and ITOps best practices. Join us.

Thank you for subscribing!

Related Post

Jan 13 2021

Turla Group: Do You KNOW This Threat Actor?

New evidence links the infamous SolarWinds hack to this threat actor.

Read More
Jan 12 2021

Rokrat – Do You KNOW This Malware

North Korean threat actors have been using this malware to target victims in South Korea.

Read More