Thursday, January 30, 2025
HomeMalwareChinese Govt-Backed Hackers Using PlugX Malware To Attack Gov Officials

Chinese Govt-Backed Hackers Using PlugX Malware To Attack Gov Officials

Published on

SIEM as a Service

Follow Us on Google News

A malicious campaign that is believed to have been perpetrated by a group of Chinese hackers has been reported recently by the Cybersecurity firm Secureworks.

In this campaign, a modular malware called PlugX is being used to infect government officials with a variety of malicious code. 

Government officials from the following countries are being targeted:-

  • Europe
  • Middle East
  • South America

Illicit Activities With PlugX

In June and July 2022, the initial intrusions were discovered, and they were considered to be ongoing. It illustrates that global espionage against governments continues to be the adversary’s primary focus.

The Bronze President appears to be a state-sponsored group that is based in China and has been active at least since July 2018. For the purpose of compromising and acquiring data from its target, the actor uses a variety of proprietary tools and publicly available tools.

There have also been other names for this malware publicly documented, including:-

  • HoneyMyte
  • Mustang Panda
  • Red Lich
  • Temp.Hex

A popular tool used by the Chinese adversarial collectives that use remote access trojans to make remote connections is PlugX (RAT).

It was observed earlier this year that the group was targeting government officials from the following countries through a revamped version of the PlugX backdoor known as Hodur:-

  • Russia
  • Asia
  • European Union
  • The U.S.

The recent campaign was attributed by Secureworks to Bronze President as a result of the use of PlugX. Not only that even several documents were found with a political theme that is aligned with China’s strategic interests in a region.

RAR archives are embedded with malware that can infect computers if the RAR files are opened. In Windows with default settings, when the archive is opened, it displays a Windows shortcut (LNK) file that mimics to be a legit document file.

An eight-level deep sequence of hidden folders named with special characters is located beside the shortcut, along with a hidden folder that contains the malware.

In this case, a decoy document is laid down, which paves the way for the PlugX payload to be dropped and set up persistence on the host that has been infected.

This group’s activities should be closely monitored by organizations in geographical regions where China has an interest, especially organizations affiliated with or acting as active government agencies in those regions.

Download Free SWG – Secure Web Filtering – E-book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability

Akamai's Security Intelligence and Response Team (SIRT) has uncovered a novel variant of the...

Google Researchers Breakdowns Scatterbrain Behind PoisonPlug Malware

Google’s Threat Intelligence Group (GTIG) in collaboration with Mandiant has revealed critical insights into...

FleshStealer: A new Infostealer Attacking Chrome & Mozilla Users

A newly identified strain of information-stealing malware, FleshStealer, is making headlines in 2025 due...