Skip to content

Mustang Panda APT Group Launches New Campaign with MQsTTang Backdoor

New campaign by Mustang Panda uses MQsTTang backdoor for espionage. European and Asian political organizations targeted.

In this image there is a store in that store there are packets and in the background there is a...
In this image there is a store in that store there are packets and in the background there is a wall, on that wall there is some text.

Mustang Panda APT Group Launches New Campaign with MQsTTang Backdoor

Cybersecurity experts at ESET have discovered a new campaign by the Mustang Panda advanced persistent threat (APT) group. The campaign, active since early January 2023, has seen a surge in activity in Europe following Russia's invasion of Ukraine. The group is employing a new custom backdoor, MQsTTang, for espionage purposes.

The MQsTTang backdoor is distributed in RAR archives containing a single executable. Filenames relate to diplomacy and passports, suggesting targeted organizations. ESET's telemetry shows unknown entities in Bulgaria and Australia have been affected. The malware uses the MQTT protocol for Command-and-Control communication, a rarity among publicly documented malware families.

The Mustang Panda group, linked to China, has targeted European and Asian organizations. These include government ministries, foreign affairs departments, embassies, geopolitical entities, and military operations. A governmental institution in Taiwan is also being targeted. ESET researchers believe political and governmental organizations in Europe and Asia are potential targets due to decoy filenames used.

The Mustang Panda APT group's use of the MQsTTang backdoor underscores their ongoing efforts to gather intelligence. Organizations, particularly in the political and governmental sectors, should remain vigilant and implement robust cybersecurity measures to protect against such threats.

Read also:

Latest