A cyberespionage threat actor dubbed Mustang Panda hits Europe with a new attack campaign. Read more about it and how to protect yourself from it. Image: Adobe Stock Cisco Talos Intelligence Group ...
State-sponsored hackers linked to the Mustang Panda activity cluster targeted diplomats by hijacking web traffic to redirect to a malware serving website. The Chinese APT hacking group "Mustang Panda" ...
The Chinese cyber espionage hacking group Mustang Panda was seen deploying a new custom backdoor named 'MQsTTang' in attacks starting this year. Mustang Panda is an advanced persistent threat (APT) ...
WHEN IT COMES TO SCAMS IN THIS DIGITAL AGE, MALWARE OR MALICIOUS SOFTWARE IS ONE OF THE WAYS THAT BAD AGENTS CAN STEAL YOUR PERSONAL INFORMATION OR CAUSE DAMAGE TO YOUR ELECTRONIC DEVICES. PHONES, ...
Mustang Panda’s already sophisticated cyberespionage campaign has matured even further with the introduction of a brand-new PlugX RAT variant. The Chinese advanced persistent threat (APT) Mustang ...
WASHINGTON (Reuters) -The U.S. Justice Department said on Tuesday that it has deleted malware planted on more than 4,200 computers by a group of criminal hackers who were backed by the People's ...
A Chinese threat group has adopted a sneak HTML technique long-used by its counterparts to target European policy-makers, in a campaign aimed at spreading the PlugX remote access Trojan (RAT). Over ...
The FBI on Tuesday announced that it erased malware from more than 4,000 computers across the United States. The malware was under the control of China state-sponsored hackers. File Photo courtesy U.S ...
French cybersecurity firms and law enforcement agents, together with partners from the United States, have successfully removed Chinese-built malware from thousands of infected PCs. In a press release ...
The U.S. Department of Justice and the FBI confirmed that a court-authorized operation allowed the remote removal of malware files from 4,258 U.S.-based computers. The operation targeted the PlugX ...
Latest campaigns by Mustang Panda highlight the threat actor's versatility in terms of the tools and techniques it is able to use. A cyberespionage group whose targeting has historically been aligned ...