Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025

WestJet Faces Cyberattack: A Major Disruption

June 16, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns
Cyberattacks

RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

Staff WriterBy Staff WriterFebruary 14, 2025Updated:May 17, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Jan 10, 2025Ravie LakshmananCyber Espionage / Cyber Attack

PlugX Malware

Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted by the China-nexus RedDelta threat actor to deliver a customized version of the PlugX backdoor between July 2023 and December 2024.

“The group used lure documents themed around the 2024 Taiwanese presidential candidate Terry Gou, the Vietnamese National Holiday, flood protection in Mongolia, and meeting invitations, including an Association of Southeast Asian Nations (ASEAN) meeting,” Recorded Future’s Insikt Group said in a new analysis.

It’s believed that the threat actor compromised the Mongolian Ministry of Defense in August 2024 and the Communist Party of Vietnam in November 2024. It’s also said to have targeted various victims in Malaysia, Japan, the United States, Ethiopia, Brazil, Australia, and India from September to December 2024.

Cybersecurity

RedDelta, active since at least 2012, is the moniker assigned to a state-sponsored threat actor from China. It’s also tracked by the cybersecurity community under the names BASIN, Bronze President, Camaro Dragon, Earth Preta, HoneyMyte, Mustang Panda (and its closely related Vertigo Panda), Red Lich, Stately Taurus, TA416, and Twill Typhoon.

The hacking crew is known for continually refining its infection chain, with recent attacks weaponizing Visual Studio Code tunnels as part of espionage operations targeting government entities in Southeast Asia, a tactic that’s increasingly being adopted by various China-linked espionage clusters such as Operation Digital Eye and MirrorFace.

The intrusion set documented by Recorded Future entails the use of Windows Shortcut (LNK), Windows Installer (MSI), and Microsoft Management Console (MSC) files, likely distributed via spear-phishing, as the first-stage component to trigger the infection chain, ultimately leading to the deployment of PlugX using DLL side-loading techniques.

Select campaigns orchestrated late last year have also relied on phishing emails containing a link to HTML files hosted on Microsoft Azure as a starting point to trigger the download of the MSC payload, which, in turn, drops an MSI installer responsible for loading PlugX using a legitimate executable that’s vulnerable to DLL search order hijacking.

In a further sign of an evolution of its tactics and stay ahead of security defenses, RedDelta has been observed using the Cloudflare content delivery network (CDN) to proxy command-and-control (C2) traffic to the attacker-operated C2 servers. This is done so in an attempt to blend in with legitimate CDN traffic and complicate detection efforts.

Recorded Future said it identified 10 administrative servers communicating with two known RedDelta C2 servers. All the 10 IP addresses are registered to China Unicom Henan Province.

Cybersecurity

“RedDelta’s activities align with Chinese strategic priorities, focusing on governments and diplomatic organizations in Southeast Asia, Mongolia, and Europe,” the company said.

“The group’s Asia-focused targeting in 2023 and 2024 represents a return to the group’s historical focus after targeting European organizations in 2022. RedDelta’s targeting of Mongolia and Taiwan is consistent with the group’s past targeting of groups seen as threats to the Chinese Communist Party’s power.”

The development comes amid a report from Bloomberg that the recent cyber attack targeting the U.S. Treasury Department was perpetrated by a fellow hacking group known as Silk Typhoon (aka Hafnium), which was previously attributed to the zero-day exploitation of four security flaws in Microsoft Exchange Server (aka ProxyLogon) in early 2021.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMetricStream Reveals 2025 GRC & Cyber GRC Predictions
Next Article Tunnel of Love Leads to Scams
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025

WestJet Faces Cyberattack: A Major Disruption

June 16, 2025
Leave A Reply Cancel Reply

Latest Posts

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 20250 Views

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 20250 Views

WestJet Faces Cyberattack: A Major Disruption

June 16, 20250 Views

Critical Vulnerabilities Resolved in Tenable Nessus Agent

June 16, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025

WestJet Faces Cyberattack: A Major Disruption

June 16, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.