• Netenrich
  • /
  • Blog
  • /
  • Mustang Panda – Do You KNOW This Threat Actor?

Mustang Panda – Do You KNOW This Threat Actor?

Post by rajarshi Nov 26, 2020

Today we are going to be focussing on a China-based threat actor – Mustang Panda. As per KNOW, our threat intel dashboard and cybersecurity news aggregator, Mustang Panda, was the third most trending threat actor over the last seven days.

Mustang panda threat actor threat intelligence dashboard from KNOW

Mustang Panda: Who are they?

Mustang Panda primarily targets non-governmental organizations (NGOs). It uses Mongolian language decoys and themes and attacks its targets with shared malware like Poison Ivy or PlugX. Their attack chain looks something like this:

  • A malicious link is sent to a Google Drive folder, cloaked using the goo.gl link shortening service.
  • When clicked on, the Google Drive link fetches a zip file, containing a .Ink file cloaked as a .pdf file.
  • Upon opening the file, it redirects the user to a Windows Scripting Component (.wsc) file. This file is hosted on a malicious microblogging page.
  • The .Ink file has an embedded VBScript to retrieve the decoy PDF file and a PowerShell script from the microblogging page.
  • The PowerShell script prepares a Cobalt Strike (https://know.netenrich.com/threatintel/malware/Cobalt%20Strike) payload.
  • Cobalt Strike connects with the command-and-control IP address allowing the threat actor to control the system remotely.

Why is Mustang Panda trending?

Security researchers have recently detected a resurgence of Mustang Panda activity. As of now, their target appears to be the Chinese Catholics. The hackers are targeting the group with an email phishing campaign. They have spoofed the Catholic journalists’ email headers in their phishbait.

Reactions from Twitter

#1 Security Week

#2 Virus Bulletin

#3 Threatpost

Mustang Panda references from Twitter

Mustang Panda references from KNOW

  • Total references: 210
  • Last 60 days: 29
  • Previous 7 days: 27

Mustang Panda context from KNOW

Mustang Panda context from KNOW

  • Risk rules triggered: 3 out of 48
  • Malware associated: PlugX and Poison Ivy.
  • Most recent sandbox reference: Any Run Sandbox result for 86590f80b4e1608d0367a7943468304f7eb665c9195c24996281b1a958bc1512

Stopping Mustang Panda with Threat and Attack Surface Intelligence

KnowledgeNOW from Netenrich is a first-of-its-kind FREE global threat intelligence platform.

KNOW is our threat intel and news-aggregator platform that allows you to gain the latest context of the hottest news in the global threatlandscape.

Your SecOps and IT Ops teams are continually observing your network 24*7, yet adversaries like FIN11 always manage to go through. To be fair, it’s not really their fault because current risk models cause them to chase false positives instead of tracking business-critical threats.

Netenrich’s resolution intelligence uses a combination of threat and attack surface intelligence that effectively addresses the following pain points:

  • Your organization’s attack surface is growing faster than your SecOps team and budget.
  • Threat actors can see exposed assets that lie outside your security’s purview.
  • There is a severe lack of talent and skill gaps is getting wider than ever before.
  • Attacks are more frequent and it only takes one to inflict severe, irreversible damage on your organization and business reputation.

Resolution intelligence is a powerful combination of machine and human intel that helps your SecOps to:

  • Find hidden risks in your brand.
  • Prioritize business-critical alerts.
  • Stay informed about the most trending threats.
  • Reduce alert fatigue by a considerable amount.

Do you want to know how we do all this? Well, first, you should subscribe to KNOW. Don’t worry. It’s completely free.

Alright, I will subscribe.

Next, you should know more about what resolution intel brings to the table. So, click on the button below to read up on it.

Awesome, let's do it

 

rajarshi

About the Author

rajarshi

Subscribe To Our Newsletter!

The best source of information for Security, Networks, Cloud, and ITOps best practices. Join us.

Thank you for subscribing!

Related Post

Hacker with a hoodie typing on a laptop
Jun 28 2021

Clop ransomware and Molerats resurface again – Threats

Clop ransomware launches a series of new attacks, ...

Read More
Hacker wearing a black hoodie typing on a computer
Jun 18 2021

KNOW this week – Avaddon, Fancy Lazarus, CVE-2021-3195

Deploy a reliable endpoint detection and resolutio...

Read More
A person pushing another away with imaginary power force
Jun 07 2021

Darkside ransomware, Sodinokibi ransomware and CVE-2018-1337

There’s an increasing trend in ransomware attacks ...

Read More