‘Infrastructure rotates and payloads can change, but the execution model persists’: Chinese hackers return to target victims across Asia with new MustangPanda threat



  • Darktrace reported Twill Typhoon (Mustang Panda) targeting Asia‑Pacific and Japan with updated FDMTP backdoor v3.2.5.1
  • Attackers used DLL sideloading via spear‑phished ZIPs with Sogou Pinyin plus malicious DLL, and impersonated Yahoo/Apple CDN traffic
  • FDMTP gathers system info, installs plugins for remote control and persistence; researchers stress behavioral detection over static indicators

Chinese state-sponsored threat actors are targeting organizations across the Asia-Pacific region, as well as Japan, with an updated version of a known backdoor, experts have warned.

A new threat intelligence report by security researchers Darktrace found as of late September 2025, and all the way through April 2026, a hacking collective called Twill Typhoon (or Mustang Panda) have been targeting organizations – including at least one finance-sector company – with a backdoor called FDMTP (now at version 3.2.5.1).

https://cdn.mos.cms.futurecdn.net/37uyEphcLreEFNUVCQzurn-2560-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

Leave a reply

Please enter your comment!
Please enter your name here

spot_imgspot_img