Chinese-language threat actors are targeting telecom companies, as part of a cyber espionage campaign tracked as ‘Operation Diànxùn,’ to steal sensitive data and trade secrets tied to 5G technology.
Hackers behind these campaigns are targering people working in the telecom industry. In some attacks, threat actors set up a fake website designed to mimic telco-giant’s Huawei career page.
According to the researchers, the tactics, techniques and procedures (TTPs) used in the campaign are compatible with the operations associated with Chinese RedDelta and Mustang Panda cyberespionage groups.
“While the initial vector for the infection is not entirely clear, the McAfee ATR team believes with a medium level of confidence that victims were lured to a domain under control of the threat actor, from which they were infected with malware which the threat actor leveraged to perform additional discovery and data collection.” reads the report published by McAfee. “It is our belief that the attackers used a phishing website masquerading as the Huawei company career page.”.
RedDelta was suspected to be behind the attacks against the Vatican and other Catholic Church-related institutions in 2020, the group employed PlugX RAT to compromise the victims’ systems.
Mustang Panda past operations include attacks on NGOs, the group used malware commonly associated with China-linked APT groups, such as Poison Ivy or PlugX.
The cyber espionage campaign is aligned with interest of the Chinese Government, it focuses on the adoption of Chinese 5G technologies by multiple countries worldwide.
Attackers used a .NET payload as a second-stage malware that was delivered tricking the victims into executing Flash-based artifacts malware.
“While the execution of the initial fake Flash installer acts mainly like a downloader, the [.NET] payload contains several functions and acts as a utility to further compromise the machine,” continues the report. “This is a tool to manage and download backdoors to the machine and configure persistence.”
In the final stage, attackers deploy a backdoor to take over the victim’s system.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, China)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.