Chinese Mustang Panda Used Fake Diplomatic Briefings to Spy on Officials

Between late December 2025 and mid-January 2026, a sophisticated cyber operation targeted government officials and international diplomats. Researchers from Dream Labs uncovered that the hackers, identified as the China-backed Mustang Panda group (also known as HoneyMyte), successfully impersonated U.S. and other international entities. They utilized counterfeit documents to deceive high-level officials into installing surveillance software on their systems.

A Deceptive Disguise

The operation’s effectiveness stemmed from its reliance on credibility rather than complex software vulnerabilities. Attackers distributed emails that resembled typical diplomatic communications, often featuring subject lines pertaining to policy developments or internal briefings. The documents were crafted to mimic legitimate summaries usually disseminated by the U.S. following significant meetings—a tactic that increased the likelihood of officials in Asia and Eastern Europe engaging with them without skepticism. The researchers pointed out that merely opening these files initiated the compromise, highlighting how trust acts as a significant weapon for cyber adversaries.

A malicious PDF used in the cyber operation (Credit: Dream Research Labs)

The Origin of the Attack

Investigations into the cyber attack suggest it can be attributed to Mustang Panda, a hacking collective with ties to China that has been operational since 2012. Dream’s report indicated that the methods of delivery, malware architecture, thematic deceptions, and shared infrastructure observed closely align with previously documented activities of this group.

The hackers deployed a surveillance tool known as PlugX, specifically a variant termed DOPLUGS. Unlike many types of malware intended to cause damage, this tool is designed for discreet data gathering. DOPLUGS functions as a “downloader,” infiltrating systems and utilizing PowerShell—a powerful Windows utility—to deploy additional malicious tools. Moreover, the attackers leveraged custom encryption techniques to evade detection by conventional security measures.

Recognizing the Threat

Dream’s detailed analysis revealed the use of a DLL search-order hijacking technique by the hackers, whereby malware deceives a trusted program into loading a compromised file instead of the intended legitimate one. This innovative method of exploitation was first identified by the Dream team in mid-January 2026, initiated by an AI-driven detection mechanism that flagged an unusual archive. The campaign aimed to surveil those engaged in electoral processes and international collaboration efforts. Shalev Hulio, CEO and Co-Founder of Dream, remarked that such activities threaten the trust frameworks essential to state-level decision-making.

As global geopolitical dynamics evolve, experts anticipate that similar deceptive briefings will continue to pose significant risks to government officials. A crucial defensive strategy involves exercising caution with any unsolicited summary or briefing documents, even if they appear to originate from reliable sources.

(Photo by Declan Sun on Unsplash)

Source