home.social

#mustangpanda — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #mustangpanda, aggregated by home.social.

  1. Mustang Panda Unveils Modular FDMTP Backdoor in Cyberespionage Push

    Cyberespionage groups like Mustang Panda are constantly evolving their tactics, and a recent campaign has seen the emergence of a modular backdoor that allows attackers to adapt and persist in compromised environments. This sophisticated tool enables hackers to blend in with legitimate processes, making it a major concern for security…

    osintsights.com/mustang-panda-

    #Cyberespionage #ModularBackdoor #Fdmtp #MustangPanda #EarthPreta

  2. quote :
    #DreamSecurity 判定這波攻勢是由中國網路間諜組織 #MustangPanda 發動。該組織利用各國的頭條新聞或重要議題作為誘餌,藉此竊取國家機密並潛伏在美國政府機構之中。

    #APT

    #中國 #駭客 鎖定全球外交官員寄假美國政策檔案 開啟即遭駭入
    cna.com.tw/news/aopl/202602040

  3. 💔 10M Dating App Users Exposed in Match Group Breach 💔

    ShinyHunters cybercrime group claims to have stolen over 10 million records from Match Group (NASDAQ: MTCH), owner of Tinder, Hinge, Match.com, and OkCupid. The alleged breach, posted January 28, 2026, includes user behavioral data from Appsflyer analytics (swipes, matches, sessions, geo-locations), hundreds of internal corporate documents, and highly sensitive personal information including romantic preferences. The 1.76GB compressed dump appears linked to ShinyHunters' broader Okta voice-phishing campaign that has already compromised Crunchbase, Betterment, and SoundCloud.

    Sources:
    - x.com/justabreach/status/20164
    - ransomware.live/id/TWF0Y2ggR3J
    - cybernews.com/security/hinge-o
    - darknetsearch.com/knowledge/ne
    - binance.com/en/square/post/01-

    #Tinder #PlentyofFish #Hinge #OKCupid #Match.com
    -----------------

    🐴 Chinese APT Upgrades Backdoor with Browser Stealers 🐼

    |Chinese espionage group Mustang Panda (aka HoneyMyte) has updated its CoolClient backdoor to steal login credentials from Chrome, Edge, and Chromium-based browsers while monitoring clipboard activity. Kaspersky researchers observed the malware targeting government entities in Myanmar, Mongolia, Malaysia, Russia, and Pakistan throughout 2025. The backdoor was deployed via compromised legitimate software from Sangfor, a Chinese cybersecurity company, and uses hardcoded API tokens for Google Drive and Pixeldrain to exfiltrate stolen data.

    Sources:
    - bleepingcomputer.com/news/secu
    - securelist.com/honeymyte-updat

    #China #CoolClinet #Chrome #Edge #MustangPanda
    -----------------

    🚨 DHS Agents Doxxed: ICE List Leaks Thousands of Federal Employee Details 🚨

    A whistleblower allegedly leaked data on ~4,500 DHS employees (ICE, Border Patrol) to a site called ICE List, exposing names, emails, phone numbers, and job info. While some data came from scraping LinkedIn, centralizing it creates a dangerous attack surface for harassment and phishing. Meta is now blocking links to the site across all platforms.

    Sources:
    - x.com/justabreach/status/20160
    - wired.com/story/meta-is-blocki
    - wired.com/story/ice-agents-are
    - police1.com/officer-safety/ice
    - scworld.com/brief/suspected-ru

    #ICE #Minneapolis #Immigration #DOXED #BorderPatrol
    -----------------

  4. 💔 10M Dating App Users Exposed in Match Group Breach 💔

    ShinyHunters cybercrime group claims to have stolen over 10 million records from Match Group (NASDAQ: MTCH), owner of Tinder, Hinge, Match.com, and OkCupid. The alleged breach, posted January 28, 2026, includes user behavioral data from Appsflyer analytics (swipes, matches, sessions, geo-locations), hundreds of internal corporate documents, and highly sensitive personal information including romantic preferences. The 1.76GB compressed dump appears linked to ShinyHunters' broader Okta voice-phishing campaign that has already compromised Crunchbase, Betterment, and SoundCloud.

    Sources:
    - x.com/justabreach/status/20164
    - ransomware.live/id/TWF0Y2ggR3J
    - cybernews.com/security/hinge-o
    - darknetsearch.com/knowledge/ne
    - binance.com/en/square/post/01-

    #Tinder #PlentyofFish #Hinge #OKCupid #Match.com
    -----------------

    🐴 Chinese APT Upgrades Backdoor with Browser Stealers 🐼

    |Chinese espionage group Mustang Panda (aka HoneyMyte) has updated its CoolClient backdoor to steal login credentials from Chrome, Edge, and Chromium-based browsers while monitoring clipboard activity. Kaspersky researchers observed the malware targeting government entities in Myanmar, Mongolia, Malaysia, Russia, and Pakistan throughout 2025. The backdoor was deployed via compromised legitimate software from Sangfor, a Chinese cybersecurity company, and uses hardcoded API tokens for Google Drive and Pixeldrain to exfiltrate stolen data.

    Sources:
    - bleepingcomputer.com/news/secu
    - securelist.com/honeymyte-updat

    #China #CoolClinet #Chrome #Edge #MustangPanda
    -----------------

    🚨 DHS Agents Doxxed: ICE List Leaks Thousands of Federal Employee Details 🚨

    A whistleblower allegedly leaked data on ~4,500 DHS employees (ICE, Border Patrol) to a site called ICE List, exposing names, emails, phone numbers, and job info. While some data came from scraping LinkedIn, centralizing it creates a dangerous attack surface for harassment and phishing. Meta is now blocking links to the site across all platforms.

    Sources:
    - x.com/justabreach/status/20160
    - wired.com/story/meta-is-blocki
    - wired.com/story/ice-agents-are
    - police1.com/officer-safety/ice
    - scworld.com/brief/suspected-ru

    #ICE #Minneapolis #Immigration #DOXED #BorderPatrol
    -----------------

  5. 💔 10M Dating App Users Exposed in Match Group Breach 💔

    ShinyHunters cybercrime group claims to have stolen over 10 million records from Match Group (NASDAQ: MTCH), owner of Tinder, Hinge, Match.com, and OkCupid. The alleged breach, posted January 28, 2026, includes user behavioral data from Appsflyer analytics (swipes, matches, sessions, geo-locations), hundreds of internal corporate documents, and highly sensitive personal information including romantic preferences. The 1.76GB compressed dump appears linked to ShinyHunters' broader Okta voice-phishing campaign that has already compromised Crunchbase, Betterment, and SoundCloud.

    Sources:
    - x.com/justabreach/status/20164
    - ransomware.live/id/TWF0Y2ggR3J
    - cybernews.com/security/hinge-o
    - darknetsearch.com/knowledge/ne
    - binance.com/en/square/post/01-

    #Tinder #PlentyofFish #Hinge #OKCupid #Match.com
    -----------------

    🐴 Chinese APT Upgrades Backdoor with Browser Stealers 🐼

    |Chinese espionage group Mustang Panda (aka HoneyMyte) has updated its CoolClient backdoor to steal login credentials from Chrome, Edge, and Chromium-based browsers while monitoring clipboard activity. Kaspersky researchers observed the malware targeting government entities in Myanmar, Mongolia, Malaysia, Russia, and Pakistan throughout 2025. The backdoor was deployed via compromised legitimate software from Sangfor, a Chinese cybersecurity company, and uses hardcoded API tokens for Google Drive and Pixeldrain to exfiltrate stolen data.

    Sources:
    - bleepingcomputer.com/news/secu
    - securelist.com/honeymyte-updat

    #China #CoolClinet #Chrome #Edge #MustangPanda
    -----------------

    🚨 DHS Agents Doxxed: ICE List Leaks Thousands of Federal Employee Details 🚨

    A whistleblower allegedly leaked data on ~4,500 DHS employees (ICE, Border Patrol) to a site called ICE List, exposing names, emails, phone numbers, and job info. While some data came from scraping LinkedIn, centralizing it creates a dangerous attack surface for harassment and phishing. Meta is now blocking links to the site across all platforms.

    Sources:
    - x.com/justabreach/status/20160
    - wired.com/story/meta-is-blocki
    - wired.com/story/ice-agents-are
    - police1.com/officer-safety/ice
    - scworld.com/brief/suspected-ru

    #ICE #Minneapolis #Immigration #DOXED #BorderPatrol
    -----------------

  6. 💔 10M Dating App Users Exposed in Match Group Breach 💔

    ShinyHunters cybercrime group claims to have stolen over 10 million records from Match Group (NASDAQ: MTCH), owner of Tinder, Hinge, Match.com, and OkCupid. The alleged breach, posted January 28, 2026, includes user behavioral data from Appsflyer analytics (swipes, matches, sessions, geo-locations), hundreds of internal corporate documents, and highly sensitive personal information including romantic preferences. The 1.76GB compressed dump appears linked to ShinyHunters' broader Okta voice-phishing campaign that has already compromised Crunchbase, Betterment, and SoundCloud.

    Sources:
    - x.com/justabreach/status/20164
    - ransomware.live/id/TWF0Y2ggR3J
    - cybernews.com/security/hinge-o
    - darknetsearch.com/knowledge/ne
    - binance.com/en/square/post/01-

    #Tinder #PlentyofFish #Hinge #OKCupid #Match.com
    -----------------

    🐴 Chinese APT Upgrades Backdoor with Browser Stealers 🐼

    |Chinese espionage group Mustang Panda (aka HoneyMyte) has updated its CoolClient backdoor to steal login credentials from Chrome, Edge, and Chromium-based browsers while monitoring clipboard activity. Kaspersky researchers observed the malware targeting government entities in Myanmar, Mongolia, Malaysia, Russia, and Pakistan throughout 2025. The backdoor was deployed via compromised legitimate software from Sangfor, a Chinese cybersecurity company, and uses hardcoded API tokens for Google Drive and Pixeldrain to exfiltrate stolen data.

    Sources:
    - bleepingcomputer.com/news/secu
    - securelist.com/honeymyte-updat

    #China #CoolClinet #Chrome #Edge #MustangPanda
    -----------------

    🚨 DHS Agents Doxxed: ICE List Leaks Thousands of Federal Employee Details 🚨

    A whistleblower allegedly leaked data on ~4,500 DHS employees (ICE, Border Patrol) to a site called ICE List, exposing names, emails, phone numbers, and job info. While some data came from scraping LinkedIn, centralizing it creates a dangerous attack surface for harassment and phishing. Meta is now blocking links to the site across all platforms.

    Sources:
    - x.com/justabreach/status/20160
    - wired.com/story/meta-is-blocki
    - wired.com/story/ice-agents-are
    - police1.com/officer-safety/ice
    - scworld.com/brief/suspected-ru

    #ICE #Minneapolis #Immigration #DOXED #BorderPatrol
    -----------------

  7. 💔 10M Dating App Users Exposed in Match Group Breach 💔

    ShinyHunters cybercrime group claims to have stolen over 10 million records from Match Group (NASDAQ: MTCH), owner of Tinder, Hinge, Match.com, and OkCupid. The alleged breach, posted January 28, 2026, includes user behavioral data from Appsflyer analytics (swipes, matches, sessions, geo-locations), hundreds of internal corporate documents, and highly sensitive personal information including romantic preferences. The 1.76GB compressed dump appears linked to ShinyHunters' broader Okta voice-phishing campaign that has already compromised Crunchbase, Betterment, and SoundCloud.

    Sources:
    - x.com/justabreach/status/20164
    - ransomware.live/id/TWF0Y2ggR3J
    - cybernews.com/security/hinge-o
    - darknetsearch.com/knowledge/ne
    - binance.com/en/square/post/01-

    #Tinder #PlentyofFish #Hinge #OKCupid #Match.com
    -----------------

    🐴 Chinese APT Upgrades Backdoor with Browser Stealers 🐼

    |Chinese espionage group Mustang Panda (aka HoneyMyte) has updated its CoolClient backdoor to steal login credentials from Chrome, Edge, and Chromium-based browsers while monitoring clipboard activity. Kaspersky researchers observed the malware targeting government entities in Myanmar, Mongolia, Malaysia, Russia, and Pakistan throughout 2025. The backdoor was deployed via compromised legitimate software from Sangfor, a Chinese cybersecurity company, and uses hardcoded API tokens for Google Drive and Pixeldrain to exfiltrate stolen data.

    Sources:
    - bleepingcomputer.com/news/secu
    - securelist.com/honeymyte-updat

    #China #CoolClinet #Chrome #Edge #MustangPanda
    -----------------

    🚨 DHS Agents Doxxed: ICE List Leaks Thousands of Federal Employee Details 🚨

    A whistleblower allegedly leaked data on ~4,500 DHS employees (ICE, Border Patrol) to a site called ICE List, exposing names, emails, phone numbers, and job info. While some data came from scraping LinkedIn, centralizing it creates a dangerous attack surface for harassment and phishing. Meta is now blocking links to the site across all platforms.

    Sources:
    - x.com/justabreach/status/20160
    - wired.com/story/meta-is-blocki
    - wired.com/story/ice-agents-are
    - police1.com/officer-safety/ice
    - scworld.com/brief/suspected-ru

    #ICE #Minneapolis #Immigration #DOXED #BorderPatrol
    -----------------

  8. 🚨 PlugX & Bookworm RATs resurface in Asia’s telecom + ASEAN networks.
    🔹 PlugX overlaps w/ Naikon + BackdoorDiplomacy
    🔹 Bookworm = Mustang Panda’s long-lived modular RAT
    🔹 DLL side-loading, RC4 key reuse, stealthy C2
    💬 Do overlaps between APT toolkits weaken attribution?
    👉 Follow @technadu for sharp threat intel.

    #PlugX #Bookworm #MustangPanda #Naikon #BackdoorDiplomacy #ASEAN #APT #ThreatIntel #CyberSecurity #TechNadu

  9. 🚨 PlugX & Bookworm RATs resurface in Asia’s telecom + ASEAN networks.
    🔹 PlugX overlaps w/ Naikon + BackdoorDiplomacy
    🔹 Bookworm = Mustang Panda’s long-lived modular RAT
    🔹 DLL side-loading, RC4 key reuse, stealthy C2
    💬 Do overlaps between APT toolkits weaken attribution?
    👉 Follow @technadu for sharp threat intel.

    #PlugX #Bookworm #MustangPanda #Naikon #BackdoorDiplomacy #ASEAN #APT #ThreatIntel #CyberSecurity #TechNadu

  10. 🚨 PlugX & Bookworm RATs resurface in Asia’s telecom + ASEAN networks.
    🔹 PlugX overlaps w/ Naikon + BackdoorDiplomacy
    🔹 Bookworm = Mustang Panda’s long-lived modular RAT
    🔹 DLL side-loading, RC4 key reuse, stealthy C2
    💬 Do overlaps between APT toolkits weaken attribution?
    👉 Follow @technadu for sharp threat intel.

    #PlugX #Bookworm #MustangPanda #Naikon #BackdoorDiplomacy #ASEAN #APT #ThreatIntel #CyberSecurity #TechNadu

  11. ☠️ ⛓️‍💥 In a novel attack chain, the threat group #MustangPanda has been combining legitimate components with malicious payloads to reduce likelihood of detection. 😨 Needless to say, it's important for #security teams to know how to spot Mustang Panda’s use of MAVInject in campaigns. 🔍

    Follow along in our latest #GraylogLabs article as we emulate an infection chain and analyze the activity it produces in #Graylog. 👁️‍🗨️ We'll walk you through:
    ⚔️ An attack overview
    🗝️ The key elements
    😬 Persistence
    🦹 Emulating the Adversary
    🔍 Detections
    💡 Indicators

    Read on to also learn threat hunting and detection approaches that you can apply in your own environments! 🙌 👇

    graylog.org/post/adversary-tra #threathunting #cybersecurity #infosec

  12. The #FBI has mass-removed the #PlugX #malware from infected US computers. The infections were attributed to #MustangPanda (aka #TwillTyphoon).

    Remember this is just one botnet of #PlugX it's still used in the wild by many other threat actor groups.

    For you #DFIR folks, ensure you know how to go #ThreatHunting for DLL-Side Loading to find #PlugX in your network.

    bleepingcomputer.com/news/secu
    #IncidentResponse