Mustang Panda Hackers from China Target TP-Link Routers for Ongoing Attacks

May 16, 2023
Network Security / Threat Intelligence

The Chinese state-sponsored group known as Mustang Panda has been connected to a series of sophisticated, targeted attacks aimed at European foreign affairs entities since January 2023. According to researchers Itay Cohen and Radoslaw Madej from Check Point, these intrusions involve a custom firmware implant specifically designed for TP-Link routers. This implant includes several malicious components, featuring a custom backdoor dubbed “Horse Shell” that allows attackers to maintain persistent access, establish anonymous infrastructure, and facilitate lateral movement within compromised networks. Furthermore, the implant’s firmware-agnostic design enables its components to be integrated into various firmware from different vendors. The Israeli cybersecurity firm is monitoring this threat group, also known as Camaro Dragon, along with other aliases such as BASIN, Bronze President, Earth Preta, HoneyMyte, RedDelta, and Red Lich.

Mustang Panda Hackers Target European Foreign Affairs with TP-Link Router Exploit

On May 16, 2023, it was reported that the Chinese state-sponsored hacking group, known as Mustang Panda, has orchestrated a series of sophisticated and targeted attacks against European foreign affairs organizations since January 2023. This alarming development highlights the increasing sophistication of cyber threats emanating from this nation-state actor.

Recent analysis conducted by cybersecurity researchers Itay Cohen and Radoslaw Madej from Check Point has unveiled that these attacks involve the deployment of custom firmware implants specifically designed for TP-Link routers. These malicious enhancements contain several nefarious components, one of which is a backdoor referred to as ‘Horse Shell.’ This backdoor allows attackers to maintain persistent access to compromised networks, facilitate lateral movement, and establish anonymous infrastructure, thereby expanding their control over target systems. Importantly, the design of this implant is firmware-agnostic, making it adaptable to various router firmware versions from different vendors.

Mustang Panda has been operating under various aliases, including Camaro Dragon, BASIN, Bronze President, Earth Preta, HoneyMyte, RedDelta, and Red Lich. These multiple names reflect the group’s extensive history and evolving tactics in the realm of cybersecurity threats.

The targets of these recent attacks have primarily been entities involved in foreign affairs across Europe, a concerning focus given the geopolitical tensions and the sensitive nature of the information handled by these organizations. Such targeting raises significant alarm bells regarding the potential for information theft and geopolitical espionage.

From an operational perspective, the tactics leveraged by Mustang Panda can be mapped onto the MITRE ATT&CK framework, particularly in areas related to initial access, persistence, and lateral movement. The use of the ‘Horse Shell’ backdoor illustrates a clear strategy to establish persistence once access is gained, while the capability for lateral movement indicates a methodical approach to infiltrating deeper layers of network defenses.

The implications of these developments are significant for business owners, particularly those whose organizations may share data or engage in partnerships with foreign affairs entities. As Mustang Panda demonstrates a consistent pattern of exploiting vulnerabilities in widely used hardware, the risks extend beyond the immediate targets to anyone connected to these networks.

In summary, the emerging tactics employed by Mustang Panda serve as a reminder that cybersecurity vigilance is essential in today’s interconnected world. Organizations must prioritize robust cybersecurity measures, especially in light of these sophisticated threats, to safeguard their networks against similar vulnerabilities.

Source link