Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 1798  |
|  Mike Powell to All  |
|  Chinese hackers hit gover  |
|  02 Oct 25 09:36:27  |
 TZUTC: -0500 MSGID: 1547.consprcy@1:2320/105 2d43c9f6 PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0 TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0 BBSID: CAPCITY2 CHRS: ASCII 1 FORMAT: flowed Chinese hackers hit government systems, stealing emails and more - here's what we know Date: Wed, 01 Oct 2025 12:02:00 +0000 Description: Say hi to Phantom Taurus - a newly discovered Chinese state-sponsored cyberespionage group. FULL STORY Chinese state-sponsored threat actors named Phantom Taurus have been seen targeting email communications and databases belonging to different countries in the Middle East and South Asia with brand new malware . Security researchers from Unit 42 have been tracking the threat actor for years, and have come to the conclusion the attackers were sponsored by China, based on a combination of technical indicators, targeting patterns, and strategic alignment. The experts observed the group targeting ministries of foreign affairs, embassies, and government entities, all typical victims of nation-state intelligence operations. Sharing infrastructure The group also used custom backdoor malware called NET-STAR which was sophisticated in the way only a nation-state could develop. The NET-STAR malware suite demonstrates Phantom Taurus advanced evasion techniques and a deep understanding of .NET architecture, representing a significant threat to internet-facing servers, the researchers explained. Phantom Taurus also apparently shares infrastructure, malware traits, and tactics with known Chinese APTs, particularly BackdoorDiplomacy. C2 domains, malware loaders, and similar spear-phishing techniques, all made Unit 42 deduce Phantom Taurus was a Chinese actor. They have now placed it next to other tauruses - Iron Taurus, Starchy Taurus, and Stately Taurus. The latter is also known as Mustang Panda and is a widely known threat actor, who was seen targeting Microsoft tools, cloud services, and more. Unfortunately, we dont know exactly how Phantom Taurus infects its victims with NET-STAR. We can only assume it includes the usual tactics such as spear-phishing or zero-day vulnerability abuse. We do know, however, that its victims are located in Afghanistan and Pakistan. China, as usual, denies any wrongdoing or any involvement in cyberattacks or cyber-espionage, and instead accuses the United States of being the worlds biggest cyber-bully. Via The Register ====================================================================== Link to news story: https://www.techradar.com/pro/security/chinese-hackers-hit-government-systems- stealing-emails-and-more-heres-what-we-know $$ --- SBBSecho 3.28-Linux * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105) SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700 SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470 SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45 SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35 PATH: 2320/105 229/426 |
[ << oldest | < older | list | newer > | newest >> ]