Tuesday, March 4, 2025
HomeMalwareChinese Govt-Backed Hackers Using PlugX Malware To Attack Gov Officials

Chinese Govt-Backed Hackers Using PlugX Malware To Attack Gov Officials

Published on

SIEM as a Service

Follow Us on Google News

A malicious campaign that is believed to have been perpetrated by a group of Chinese hackers has been reported recently by the Cybersecurity firm Secureworks.

In this campaign, a modular malware called PlugX is being used to infect government officials with a variety of malicious code. 

Government officials from the following countries are being targeted:-

  • Europe
  • Middle East
  • South America

Illicit Activities With PlugX

In June and July 2022, the initial intrusions were discovered, and they were considered to be ongoing. It illustrates that global espionage against governments continues to be the adversary’s primary focus.

The Bronze President appears to be a state-sponsored group that is based in China and has been active at least since July 2018. For the purpose of compromising and acquiring data from its target, the actor uses a variety of proprietary tools and publicly available tools.

There have also been other names for this malware publicly documented, including:-

  • HoneyMyte
  • Mustang Panda
  • Red Lich
  • Temp.Hex

A popular tool used by the Chinese adversarial collectives that use remote access trojans to make remote connections is PlugX (RAT).

It was observed earlier this year that the group was targeting government officials from the following countries through a revamped version of the PlugX backdoor known as Hodur:-

  • Russia
  • Asia
  • European Union
  • The U.S.

The recent campaign was attributed by Secureworks to Bronze President as a result of the use of PlugX. Not only that even several documents were found with a political theme that is aligned with China’s strategic interests in a region.

RAR archives are embedded with malware that can infect computers if the RAR files are opened. In Windows with default settings, when the archive is opened, it displays a Windows shortcut (LNK) file that mimics to be a legit document file.

An eight-level deep sequence of hidden folders named with special characters is located beside the shortcut, along with a hidden folder that contains the malware.

In this case, a decoy document is laid down, which paves the way for the PlugX payload to be dropped and set up persistence on the host that has been infected.

This group’s activities should be closely monitored by organizations in geographical regions where China has an interest, especially organizations affiliated with or acting as active government agencies in those regions.

Download Free SWG – Secure Web Filtering – E-book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in...

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...