China-linked hacking group Phantom Taurus targeting embassies, foreign ministries
中国关联的网络间谍组织Phantom Taurus针对非洲、中东和亚洲的外交部、大使馆及电信公司发起攻击,目标是获取与地缘政治和军事行动相关的情报。该组织使用新型恶意软件NET-STAR进行高隐蔽性操作,并通过攻击技术供应商窃取外交通信和国防情报。 2025-10-1 16:31:1 Author: therecord.media(查看原文) 阅读量:3 收藏

Espionage hackers aligned with China are targeting foreign ministries, embassies and telcos across Africa, the Middle East, and Asia, researchers have found.

Palo Alto Network’s Unit 42 has been observing a previously undocumented nation-state hacking group that it dubbed Phantom Taurus targeting government and telecommunications organizations with the goal of obtaining information connected to geopolitical events and military operations. The group has been operating for about two-and-a-half years. 

Unit 42 said Phantom Taurus stood out because of the distinctive tactics used to conduct “highly covert operations and maintain long-term access to critical targets.”

The company has been tracking the group’s activity since June 2023, observing a trail of attacks that allowed hackers to obtain sensitive, non-public information from multiple governments. 

The hackers target technology providers to government entities, allowing them to pilfer diplomatic communications, defense-related intelligence and the operations of critical governmental ministries.

Unit 42 found that the timing of cyberattacks launched by the group typically lined up with major global events or regional incidents. The researchers did not say which countries were targeted.

NET-STAR malware

Phantom Taurus has been seen using operational infrastructure used by other known Chinese groups like APT27, Winnti, and Mustang Panda. But Phantom Taurus has separated itself from other Chinese espionage groups by using a new suite of malware and employing comparatively more evolved tactics, according to Unit 42. 

They have deployed a mix of commonly used Chinese malware like China Chopper while also using new customized hacking tools the researchers named NET-STAR. 

The group has evolved in the last two years, moving from targeting emails held within servers to now stealing full databases of information. 

Much of Unit 42’s report focuses on the new suite of malware designed to target Internet Information Services (IIS) web servers — software from Microsoft used for hosting material online. 

The NET-STAR malware “demonstrates Phantom Taurus’ advanced evasion techniques and a deep understanding of .NET architecture, representing a significant threat to internet-facing servers.”

The suite consists of three backdoors that each serve different roles in the attack chain, allowing the hackers to access databases, evade antivirus solutions, and more. One script used for stealing databases was deployed in attacks targeting information on Afghanistan and Pakistan.

Lauren Rucker, a cybersecurity expert at Deepwatch, said the NET-STAR tools are exceptionally difficult to detect because the malware “leaves no footprint for traditional antivirus to find and was designed to actively blind modern security solutions like [Endpoint Detection and Response] by disabling critical Windows security monitoring features.”

Chinese APT groups have long targeted foreign ministries and embassies in a variety of ways over the last decade. 

In addition to longstanding attacks on U.S. diplomats, Chinese groups have been accused of attacking governments and embassies in Sweden, France, the U.K., Ukraine, Hungary, Singapore, the Czech Republic, Japan, Lithuania, multiple Southeast Asian countries and several Pacific islands.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/china-linked-phantom-taurus-hacking
如有侵权请联系:admin#unsafe.sh