ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Mustang Panda, Bronze President

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Mustang Panda, Bronze President

NamesMustang Panda (CrowdStrike)
Bronze President (SecureWorks)
TEMP.Hex (FireEye)
HoneyMyte (Kaspersky)
Red Lich (PWC)
Earth Preta (Trend Micro)
Camaro Dragon (Check Point)
CountryChina China
MotivationInformation theft and espionage
First seen2012
Description(CrowdStrike) In April 2017, CrowdStrike Falcon Intelligence observed a previously unattributed actor group with a Chinese nexus targeting a U.S.-based think tank. Further analysis revealed a wider campaign with unique tactics, techniques, and procedures (TTPs). This adversary targets non-governmental organizations (NGOs) in general, but uses Mongolian language decoys and themes, suggesting this actor has a specific focus on gathering intelligence on Mongolia. These campaigns involve the use of shared malware like Poison Ivy or PlugX.

Recently, Falcon Intelligence observed new activity from Mustang Panda, using a unique infection chain to target likely Mongolia-based victims. This newly observed activity uses a series of redirections and fileless, malicious implementations of legitimate tools to gain access to the targeted systems. Additionally, Mustang Panda actors reused previously-observed legitimate domains to host files.

Also see RedDelta.
ObservedSectors: Aviation, Education, Government, NGOs, Think Tanks, Telecommunications.
Countries: Australia, Bangladesh, Belgium, Bulgaria, China, Cyprus, Czech, Ethiopia, France, Germany, Greece, Hong Kong, Hungary, India, Indonesia, Japan, Mongolia, Myanmar, Nepal, Pakistan, Philippines, Russia, Singapore, Slovakia, South Africa, South Korea, South Sudan, Sweden, Taiwan, Thailand, UK, USA, Vietnam and UN.
Tools usedAdFind, China Chopper, Cobalt Strike, Hodur, HopperTick, nbtscan, MQsTTang, NetSess, Netview, nmap, Orat, Poison Ivy, PlugX, PowerView, PUBLOAD, PVE Find AD Users, RCSession, TeamViewer, TinyNote, TONEINS, TONESHELL, WmiExec, WispRider.
Operations performed2014Secureworks Counter Threat Unit (CTU) researchers have observed BRONZE PRESIDENT activity since mid-2018 but identified artifacts suggesting that the threat actors may have been conducting network intrusions as far back as 2014.
Aug 2019In mid-August 2019, the Anomali Threat Research Team discovered suspicious “.lnk” files during routine intelligence collection. While the distribution method of these documents cannot be confirmed at this time, it is likely that spearphishing is being utilized because it aligns with Mustang Panda’s TTPs, and it is a common tactic used amongst APT actors.
Jan 2020Avira’s Advanced Threat Research team discovered a new version of PlugX from the Mustang Panda APT that is used to spy on some targets in Hong Kong and Vietnam. The way that the APT actor infects the target, and launches the malicious payload is similar to previous versions—but with some differences.
Mar 2020Vietnamese cyber-security firm VinCSS detected a Chinese state-sponsored hacking group (codenamed Mustang Panda) spreading emails with a RAR file attachment purporting to carry a message about the coronavirus outbreak from the Vietnamese Prime Minister.
Mar 2020ATR identified that the Higaisa and Mustang Panda Advanced Persistent Threat (APT) groups have been utilizing Coronavirus-themed lures in their campaigns.
Mar 2021Indonesian intelligence agency compromised in suspected Chinese hack
Aug 2021Mustang Panda’s Hodur: Old tricks, new Korplug variant
Feb 2022Mustang Panda or Temp.Hex, a China-based threat actor, targeted European entities with lures related to the Ukrainian invasion.
Feb 2022Mustang Panda deploys a new wave of malware targeting Europe
Feb 2022Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets
Mar 2022BRONZE PRESIDENT Targets Russian Speakers with Updated PlugX
Mar 2022Earth Preta Spear-Phishing Governments Worldwide
Jun 2022BRONZE PRESIDENT Targets Government Officials
2022Earth Preta’s Cyberespionage Campaign Hits Over 200
Oct 2022Pack it Secretly: Earth Preta’s Updated Stealthy Strategies
Dec 2022Operation “SmugX”
SmugX: Unveiling a Chinese-Based APT Operation Targeting European Governmental Entities: Check Point Research Exposes a Shifting Trend
Jan 2023MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT
Jan 2023Malware Spotlight: Camaro Dragon’s TinyNote Backdoor
Early 2023Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives
Apr 2023New Mustang Panda’s campaing against Australia
May 2023Check Point Research reveals a malicious firmware implant for TP-Link routers, linked to Chinese APT group

Last change to this card: 05 September 2023

Download this actor card in PDF or JSON format

Previous: MuddyWater, Seedworm, TEMP.Zagros, Static Kitten
Next: Naikon, Lotus Panda

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]