Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Mustang Panda Linked to FDMTP Backdoor in Asia-Pacific Espionage

May 14, 2026

Google’s Android Apps Get Public Verification to Stop Supply Chain Attacks

May 14, 2026

Google Launches Android Spyware Forensics Tool for High-Risk Users

May 14, 2026
Facebook X (Twitter) Instagram
Thursday, May 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Mustang Panda Linked to FDMTP Backdoor in Asia-Pacific Espionage
News

Mustang Panda Linked to FDMTP Backdoor in Asia-Pacific Espionage

Team-CWDBy Team-CWDMay 14, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


An updated variant of the FDMTP backdoor has been observed in a months-long espionage campaign aimed at networks in the Asia-Pacific and Japan, with researchers linking the activity to the China-aligned group Mustang Panda.

According to new analysis from Darktrace, multiple customer environments began making requests to attacker infrastructure impersonating well-known content delivery networks (CDNs) in late September 2025, with activity continuing through April 2026.

Darktrace assessed with moderate confidence that the campaign aligns with publicly reported Mustang Panda tradecraft, though it notes the techniques are not unique to a single actor.

The group, which Darktrace tracks as Twill Typhoon, is also known as Earth Preta, Stately Taurus, Bronze President and TA416.

CDN Impersonation and DLL Sideloading

Affected hosts retrieved legitimate executables, matching .config files and malicious DLLs from domains posing as Yahoo and Apple infrastructure.

In one finance-sector case from April 2026, an endpoint pulled legitimate binaries such as vshost.exe and dfsvc.exe before fetching paired configuration and DLL components over an 11-day window.

The sideloading chain relied on legitimate binaries loading malicious DLLs of the same name as their expected libraries.

In a observed case, a malicious browser_host.dll was placed alongside the legitimate Sogou Pinyin input method binary biz_render.exe, allowing the payload to execute inside a trusted process.

Read more on Mustang Panda activity: Chinese Hackers Target European Governments in Espionage Campaigns

Decoded strings then loaded the .NET runtime in-process and pulled the next stage directly into memory as a managed assembly.

Updated FDMTP and Modular Plugins

The final-stage payload of the campaign is a heavily obfuscated .NET backdoor that Darktrace identifies as version 3.2.5.1 of FDMTP, a tool first documented by Trend Micro in 2024 as a Mustang Panda secondary control implant.

Communication runs over custom TCP using the Duplex Message Transport Protocol (DMTP), with cluster-based resolution, token validation and a persistent message loop for remote tasking.

Darktrace identified four loadable plugins in the framework: one for scheduled-task creation, one for registry persistence, one for loading and persisting the main framework, and one for remote file retrieval and process manipulation.

Persistence is maintained through scheduled tasks and registry entries under HKCUSoftwareMicrosoftIME, alongside a separate update channel that polls icloud-cdn[.]net every five minutes for new payloads.

Darktrace urged defenders to anchor detection to the behavioral sequence.

“Infrastructure rotates and payloads can change, but the execution model persists,” the company wrote. “For defenders, the implication is straightforward: detection anchored to individual indicators will degrade quickly. Detection anchored to a behavioral sequence offers a far more durable approach.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle’s Android Apps Get Public Verification to Stop Supply Chain Attacks
Team-CWD
  • Website

Related Posts

News

Google’s Android Apps Get Public Verification to Stop Supply Chain Attacks

May 14, 2026
News

Google Launches Android Spyware Forensics Tool for High-Risk Users

May 14, 2026
News

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Fixing trivial passwords is as easy as 123456

May 7, 2026

Find your weak spots before attackers do

November 21, 2025

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.